Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe
-
Size
13KB
-
MD5
85cc2ed28879910c011fb8177cccb1ca
-
SHA1
a55c3394018fd707dbda9346b1a4ec12f4ef4b74
-
SHA256
3498501dfbb1caf01b3c6e591169f3e60d5d8f78d7c2b0cf334f26c098468daf
-
SHA512
6cda34e1d5931c971d27bb1b54d4bf0695aeb74e60baa7b0a4b96cadbe4503cc70c0600ae71957fa795016bf7e29ade6c357358fea3e3672aab8ee8b82fa9227
-
SSDEEP
384:ytLoqwQHsotHULtf3jo4SvGWuXpAYLtg8kcNVp77:Mo6ofjo5uXCYmxoVpP
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\umprznuu.dll = "{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}" 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2772 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\umprznuu.tmp 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\umprznuu.tmp 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\umprznuu.nls 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F} 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ = "C:\\Windows\\SysWow64\\umprznuu.dll" 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ThreadingModel = "Apartment" 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2772 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 31 PID 1292 wrote to memory of 2772 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 31 PID 1292 wrote to memory of 2772 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 31 PID 1292 wrote to memory of 2772 1292 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5E37.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD50f07210d937693534041f65e83acd787
SHA17ef1b83acbf4093a1d2c10ab161110f12582af3b
SHA256a3ed8448e15d02f41925c28b94b938113d58effb296184e12dcd439e5c8e0ebd
SHA512018c868c7c3435ab6a656020c7d4ad0debbaeecc7544f073c2d6cd8f5e56f932b747935780da6a451cb896348ed1ddc825cb80748999f9437b4cd514c20c58f3
-
Filesize
2.1MB
MD5616d9b6efa933490ee087123aacadb02
SHA17099cc7f44a2819bd8d64cda79fc1e9030d6362d
SHA2563a683fbe434e208a5032d4515d6b3138b70521da935e442a2a302afabba67aa8
SHA512b344ba1f411e112c9b8d9afb19eba7f0f83fe3ff1402dfc647c4294c28c96519476e8d5b939ba6364f2a85cef6108678ac0237cbe57a4e061af09f5812454cf1