Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
8392290af372489dc65f95500a50f309_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8392290af372489dc65f95500a50f309_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8392290af372489dc65f95500a50f309_JaffaCakes118.exe
-
Size
96KB
-
MD5
8392290af372489dc65f95500a50f309
-
SHA1
b58a0bb7713aa93c3bddaa0c059c950b7bc6d555
-
SHA256
f9c50c6c972211098240be120e2c11b1269723f5cbb01b2b5d3746682e43e2c4
-
SHA512
8799b977ecd56871030aec95d83cef49b0a290ba96b388bba22710a14a30250cd9b51866319ae352104afe8dbd4a43c7fa8f697fd1882cb982764dc197e429ff
-
SSDEEP
1536:sNo3AyIK6zjSJq9FfHo6H98xbzkcdNU0AQFGOu7XfK3ajG4daUdJ9b:sNowVxeYbo6cXNdGOuW94dZf9
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4996 rundll32.exe 2056 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Hfijovi = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\LTororU.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8392290af372489dc65f95500a50f309_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe 4996 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 652 wrote to memory of 4996 652 8392290af372489dc65f95500a50f309_JaffaCakes118.exe 85 PID 652 wrote to memory of 4996 652 8392290af372489dc65f95500a50f309_JaffaCakes118.exe 85 PID 652 wrote to memory of 4996 652 8392290af372489dc65f95500a50f309_JaffaCakes118.exe 85 PID 4996 wrote to memory of 2056 4996 rundll32.exe 97 PID 4996 wrote to memory of 2056 4996 rundll32.exe 97 PID 4996 wrote to memory of 2056 4996 rundll32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8392290af372489dc65f95500a50f309_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8392290af372489dc65f95500a50f309_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\LTororU.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\LTororU.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ee482cac697b610d373d7bb5a4cf8877
SHA1c28e87d1dcba94f600b8aee76fd7d3414f9a4488
SHA2560c095a32a0a168d161ecb25107c3243a441c1cf7309ff7810a5864413167563e
SHA51200fe94f52a1fa0b270defa47d30eec150f0e3064451d5c0ccde8ecd49d90fe37371188bd465acd13134c78602b56ff4fe54856127f1a147a6a9b3f08e23d250e