Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe
-
Size
242KB
-
MD5
684a5897845b7b545a8dc6ef6083f382
-
SHA1
6af48c5784d37193666611a63b5facbb0fb0fc30
-
SHA256
03b9de03556e9f0189fa8763913c458eb714c0044d19bd396cd8433cc982cee2
-
SHA512
7733bfc990de401910df93cb1893183b2559e57db116a02810b494c34c485810b4d081737a11daf5cf6584f63f1de9e2d9c7e6c411d7a45188505fe29efe3004
-
SSDEEP
6144:l0btAc58Us34ok5i02fVfzWfyXJCmzq5oDuoakRWuc6Lw+o:oAc58UG4ok5i5dfafyXJp5DuoaHulL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4216 tmpUI32drv.exe -
Loads dropped DLL 3 IoCs
pid Process 3448 rundll32.exe 3448 rundll32.exe 3448 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1824 3448 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpUI32drv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4216 3700 684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe 84 PID 3700 wrote to memory of 4216 3700 684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe 84 PID 3700 wrote to memory of 4216 3700 684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe 84 PID 4216 wrote to memory of 3448 4216 tmpUI32drv.exe 85 PID 4216 wrote to memory of 3448 4216 tmpUI32drv.exe 85 PID 4216 wrote to memory of 3448 4216 tmpUI32drv.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\684a5897845b7b545a8dc6ef6083f382_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Roaming\tmpUI32drv\tmpUI32drv.exeC:\Users\Admin\AppData\Roaming\tmpUI32drv\tmpUI32drv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\TMPUI3~1\TMPUI3~1.DLL 0003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 7444⤵
- Program crash
PID:1824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3448 -ip 34481⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5354d5368b50e0b4df0b3275d4192b4de
SHA1b7ee6ce0ab5be105e61355be6cb54f8cb3873d39
SHA256be9246e36047d288ddfaa4123318ded364303a509aaf7f2ca3564f6845ecb2fd
SHA51290031b2e575b669eaf5c710371c5b60020a762b869db354a9e816cd63b67ac153f9d33106ca91876275c0d6be741688c7e67402cb06fbdf3a68c25d37e5f08e9
-
Filesize
232KB
MD56d8a2a064162d18f86bb9f6fe5e79871
SHA10056904c17369599d0611927690e5fdbafe0d26b
SHA2561c4b52967d5c83c21f3347d70223cdb1c86c51b0eb62614f4368c605baebbed9
SHA51238de17001d850acee48df79a9eda7632d3cdfc2bc92be4ea19174e743e30a0eb66d53a4f86af2d6d44c6f2e08720efad33208bc62ec349df93f34438d3066390
-
Filesize
242KB
MD5684a5897845b7b545a8dc6ef6083f382
SHA16af48c5784d37193666611a63b5facbb0fb0fc30
SHA25603b9de03556e9f0189fa8763913c458eb714c0044d19bd396cd8433cc982cee2
SHA5127733bfc990de401910df93cb1893183b2559e57db116a02810b494c34c485810b4d081737a11daf5cf6584f63f1de9e2d9c7e6c411d7a45188505fe29efe3004