Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 06:17
Behavioral task
behavioral1
Sample
8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe
-
Size
96KB
-
MD5
8354ad1fab14c01f2707398bd0198e11
-
SHA1
89461eab223e5fb13130b56ac3ed7026abc153d4
-
SHA256
8cb3b8c8007fe2642ead7dda5966d4193be6d7eb8312cf826c4e3587043df511
-
SHA512
fe9686e945b38e33899458295737e4f724bf15eaa73498dbb409557fa6faeec67e213e88db17933e1280246e17c775df52d749c789bf02cece4d0d96fa4f2ebe
-
SSDEEP
1536:+nRDdoT5ByBtnGxYbee2lAVJkEtQwoAzkIvc0rqVq5GnE9unGg1cQ7IoqAqLWQuy:yc5kBtGxJneJERAw9E9cFmQ7INA4t/Iy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 rundll32.exe -
resource yara_rule behavioral2/memory/4308-0-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect behavioral2/memory/4308-1-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect behavioral2/memory/4308-12-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Darkbomb.dll 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1344 4308 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe 86 PID 4308 wrote to memory of 1344 4308 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe 86 PID 4308 wrote to memory of 1344 4308 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe 86 PID 1344 wrote to memory of 2968 1344 cmd.exe 88 PID 1344 wrote to memory of 2968 1344 cmd.exe 88 PID 1344 wrote to memory of 2968 1344 cmd.exe 88 PID 4308 wrote to memory of 1932 4308 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe 89 PID 4308 wrote to memory of 1932 4308 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe 89 PID 4308 wrote to memory of 1932 4308 8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8354ad1fab14c01f2707398bd0198e11_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "c:\support338945a0.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe Darkbomb.dll FunctionStart3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8354AD~1.EXE >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5cd7c4b4ea5da926d4b166b5a577c6b87
SHA178a18a4d1e628957221bbba7dc6a129cbffee719
SHA256f2b482023389f42578000a3bbefaa7df0e0dae11df82ab142a111c9ba556fa40
SHA5122ffd9ce2b1819c620bd90da87497b509114bbf8833d741ea609c4515144d2408282fd57807443b4ab47562c9721426ea3826a4e3991a182ee0777f4042433321
-
Filesize
39B
MD5d6ad254c75599ac9ceb317d261cfe354
SHA1f9c9bae9bdba0ea9d3c486e13cb554ec9b010909
SHA2563142a7859b079df4a8fd3daf7a9d0057dd2c18ca302c69a6f9526ee543c9a655
SHA512b05820cab51f66b5b8213359f0a0ddde125e3eab5fdfd196393dc805fc02fd9e72bdb1704cc0718131fc55a8b3d7cd7e54f53fa8140a187b508c443f6d85b473