Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe
-
Size
341KB
-
MD5
882b2e7c8bb781fc77351add3e7f6e63
-
SHA1
933bec1c429978c289657a05ab5b01e8fbbaac1a
-
SHA256
4e3e619b80b3204cdd841a2a6dac5a17da1222ad2cb56fb6f213b3131af6e462
-
SHA512
74a052095a06dc94b0ce899e643b92dfce09133d181156844a3460592b90495913ee106e1261f33d986311478c12e1694deb3b72c6de3e78567e0dfd2851d545
-
SSDEEP
6144:FHXm6YGNT0saL0TXOSgHnwr5yX7tfQN5/inEaMadDKNa1aIHgD:FH2FG90sH9Mns5yrtfQunka1KNaTAD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1308 nvscv32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\nvscv32.exe 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nvscv32.exe 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini nvscv32.exe File opened for modification C:\Windows\SysWOW64\nvscv32.exe nvscv32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvscv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\sDate = "-" 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.Default\Software\Microsoft\Windows\CurrentVersion\Internet Settings 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodial = 01000000 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodisconnect = 01000000 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\International nvscv32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\International\sDate = "-" nvscv32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3464 wrote to memory of 220 3464 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe 85 PID 3464 wrote to memory of 220 3464 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe 85 PID 3464 wrote to memory of 220 3464 882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\882b2e7c8bb781fc77351add3e7f6e63_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a$$.bat2⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\nvscv32.exeC:\Windows\SysWOW64\nvscv32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD548306d083bf772eb655a81b6ae4345e3
SHA1e5e4b1b7430c36dbe5e1f18ca55fed1d0e0d49ca
SHA2564e07ef3d2da3805fe2dad456dd5e5465591a113059df9fe69da4cee1a1bb5d0e
SHA512c516ee689a877f11c8c55f26dd153c101b4f31679d0e1a35e2f3fe1ba590b1a817258d14c876aad27562fcd63e342c01cc23bcabb04fd9d59085595ab78652a9
-
Filesize
341KB
MD5882b2e7c8bb781fc77351add3e7f6e63
SHA1933bec1c429978c289657a05ab5b01e8fbbaac1a
SHA2564e3e619b80b3204cdd841a2a6dac5a17da1222ad2cb56fb6f213b3131af6e462
SHA51274a052095a06dc94b0ce899e643b92dfce09133d181156844a3460592b90495913ee106e1261f33d986311478c12e1694deb3b72c6de3e78567e0dfd2851d545