Analysis
-
max time kernel
145s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe
-
Size
13KB
-
MD5
85cc2ed28879910c011fb8177cccb1ca
-
SHA1
a55c3394018fd707dbda9346b1a4ec12f4ef4b74
-
SHA256
3498501dfbb1caf01b3c6e591169f3e60d5d8f78d7c2b0cf334f26c098468daf
-
SHA512
6cda34e1d5931c971d27bb1b54d4bf0695aeb74e60baa7b0a4b96cadbe4503cc70c0600ae71957fa795016bf7e29ade6c357358fea3e3672aab8ee8b82fa9227
-
SSDEEP
384:ytLoqwQHsotHULtf3jo4SvGWuXpAYLtg8kcNVp77:Mo6ofjo5uXCYmxoVpP
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\owputqcx.dll = "{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}" 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\owputqcx.tmp 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\owputqcx.tmp 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\owputqcx.nls 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F} 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ = "C:\\Windows\\SysWow64\\owputqcx.dll" 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21BE5FDF-D4CB-4850-AD99-21E68B50BF3F}\InProcServer32\ThreadingModel = "Apartment" 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 2284 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 95 PID 3216 wrote to memory of 2284 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 95 PID 3216 wrote to memory of 2284 3216 85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85cc2ed28879910c011fb8177cccb1ca_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\3870.tmp.bat2⤵
- System Location Discovery: System Language Discovery
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD50f07210d937693534041f65e83acd787
SHA17ef1b83acbf4093a1d2c10ab161110f12582af3b
SHA256a3ed8448e15d02f41925c28b94b938113d58effb296184e12dcd439e5c8e0ebd
SHA512018c868c7c3435ab6a656020c7d4ad0debbaeecc7544f073c2d6cd8f5e56f932b747935780da6a451cb896348ed1ddc825cb80748999f9437b4cd514c20c58f3
-
Filesize
2.4MB
MD5140d4fca74e1bb59070db5b32ca12d8b
SHA19add27c8246900610c8fdd9a39f81e43888eff47
SHA256b6eeb5ecbc95f552df6551907696fe8d8412675c6f0954b6fd9a1b0d5fbbca6d
SHA5129276a1d1add9b8efeb2fe48a5e65721a5939205f8c75e859c33e38973913745c3a26e330beabba55951a35b42702b49e0ad85b7260266f4aea2f5ca9d2f0a5a8