Analysis
-
max time kernel
138s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe
-
Size
38KB
-
MD5
89b787a4c21eff7c2ebc25793ad28c09
-
SHA1
cb8be5a3539597bc90d8dfb42797c26d8f2dc623
-
SHA256
4344430c9cf45466dc76672c741fa3290b63297510a2f2c25c4a1f18fe058b7e
-
SHA512
ad9b5b40a929ec2a455f20b9e3fef4b123fd2711a912dbefa021926f100b947366895037e876448321419b72fbec3eafcc90d3a42c9dca3582c9bcd2a8fccb2b
-
SSDEEP
768:gF75Qu6d+I5m5XzrJCIp3ptMDW5cxsNxUtJqlP0:4aUXQI9wDW5XN6t8c
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 Destination IP 178.162.181.106 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5048 set thread context of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\M0Ee816Rk.com 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\M0Ee816Rk.com 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3612 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 3612 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88 PID 5048 wrote to memory of 3612 5048 89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\89b787a4c21eff7c2ebc25793ad28c09_JaffaCakes118.exe2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1460