Analysis

  • max time kernel
    147s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 08:33

General

  • Target

    89b1c199e235a3c18813de82ab3651ed_JaffaCakes118.exe

  • Size

    48KB

  • MD5

    89b1c199e235a3c18813de82ab3651ed

  • SHA1

    f6d5c58dbfb6b6895097270bd6e222dff5ddcb6f

  • SHA256

    0cabfcdb41669c32f3f9a14a2e55fca95c3bbc9b053c961ff8d5c7ac27c898f5

  • SHA512

    8236916e9e328e5fbb82a749a5ff40c85b127db7b9b04e0c4736c3073970588adc2d6bcb43f8e3eb98ddd752093abcb7260573345b6de0d94ea22b9a387ab14b

  • SSDEEP

    768:p2xs2ADqegxlaDsBZyR10IkReO9hVjkCbtGdS002Fr:p2xYDqHx8DKZiWIk99w0N0V

Malware Config

Signatures

  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Modifies Shared Task Scheduler registry keys 2 TTPs 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89b1c199e235a3c18813de82ab3651ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89b1c199e235a3c18813de82ab3651ed_JaffaCakes118.exe"
    1⤵
    • Modifies Shared Task Scheduler registry keys
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\wndutl32.dll,load
      2⤵
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Modifies Shared Task Scheduler registry keys
      • Loads dropped DLL
      • Windows security modification
      • Sets desktop wallpaper using registry
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • System policy modification
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wndutl32.dll

    Filesize

    13KB

    MD5

    92c2f5c069fcf957f641faa880a6ee9f

    SHA1

    4d6adbca20982f086f0523ac7bce2fc224edac35

    SHA256

    5b62577023c598eabb68c080189d41ba67fe084270ac6bccbb053ba3ee2d865e

    SHA512

    4ffb6d8418aac7780286c46e2ae35ccca5f6d5f3d472e8fe5b1298aeda023d3e524b9eb8dcfd338a0100da4bc440c90af52fb914439e1c0362bc128d9538b676

  • memory/528-0-0x0000000000403000-0x000000000040D000-memory.dmp

    Filesize

    40KB

  • memory/528-1-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/528-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/528-10-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/528-9-0x0000000000403000-0x000000000040D000-memory.dmp

    Filesize

    40KB