Analysis
-
max time kernel
137s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe
-
Size
503KB
-
MD5
76ed5dfda9927f2b8855b4474367236a
-
SHA1
50f36f45e84dbb70b8da556b1e1d136f8ead76fd
-
SHA256
afa69fc0bae31504cd2d0ebb529b153b8b396d99cd2352698d1dd17a41d4b814
-
SHA512
7de818915e761cd739512a86caadb0532610e99e4b8cffbe604b227347b01da70b8114208200ac728c02f3a96f67458e742b979ada1e11a3ade2a330f54f31d4
-
SSDEEP
6144:4qseQew6HwolLbgI52iV8MPoRGL3BAFjvkqaAUrQhXCz2+KTDWGY1YozK92T4:4aQn6/BgIYJ64wq/bpY2+KWPm2T4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3488 shdwin32img.exe -
Loads dropped DLL 3 IoCs
pid Process 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4816 2980 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shdwin32img.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3488 3884 76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe 84 PID 3884 wrote to memory of 3488 3884 76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe 84 PID 3884 wrote to memory of 3488 3884 76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe 84 PID 3488 wrote to memory of 2980 3488 shdwin32img.exe 85 PID 3488 wrote to memory of 2980 3488 shdwin32img.exe 85 PID 3488 wrote to memory of 2980 3488 shdwin32img.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\shdwin32img\shdwin32img.exeC:\Users\Admin\AppData\Roaming\shdwin32img\shdwin32img.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\SHDWIN~1\SHDWIN~1.DLL 0003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 7444⤵
- Program crash
PID:4816
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2980 -ip 29801⤵PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD530d8b5131cf5a8b59f329fd3c447eabc
SHA1e3ddf1361ad701e56cac583022d205e93df46395
SHA256b9a4efa07ea621c19b891ce6a65d6d6696e4257370adb9319cbe935c64c55131
SHA5125fc0c06650f1c3bae970fd9f7fe83b8c9308f35321d19783a2fc23b1192ac585ff3481b54dfca5dc1fef212aa26a8ea7d6da2b3ea80ca8689cd3c18ed37c218f
-
Filesize
233KB
MD575be953cf43de0d912be67442cd9a5e9
SHA1fe699f681582cdf252ea8292196f9d8b80a699b3
SHA2568fe0040d017b9e4b7e88a79397d19b909bd46e7523c738313c60f85a497167d8
SHA512e67a52550ad204ef19bc21893099ea4dc5a90b57f3bf5c563d024b2b2e68efd1ea8dd63be0f1560d7431a164f6feb50235bfa2e274e3cc01bfc131674eb818ac
-
Filesize
503KB
MD576ed5dfda9927f2b8855b4474367236a
SHA150f36f45e84dbb70b8da556b1e1d136f8ead76fd
SHA256afa69fc0bae31504cd2d0ebb529b153b8b396d99cd2352698d1dd17a41d4b814
SHA5127de818915e761cd739512a86caadb0532610e99e4b8cffbe604b227347b01da70b8114208200ac728c02f3a96f67458e742b979ada1e11a3ade2a330f54f31d4