Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 21:46
Behavioral task
behavioral1
Sample
a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe
-
Size
89KB
-
MD5
a00ec201154552f2403d645e5d3f8cd2
-
SHA1
56fb70022bf815a985c7f7a28742730e10d415db
-
SHA256
5db0ab548a006902562be32ea74840d469dcabd5b761bdf4d436f18f174ded83
-
SHA512
0ce6fdba6f44a53d3fae425abec6371f1348f548022aec04c1380322c707ee0445bceca0eb7d42ee48d5c3ce5e326df9f1102b6e7c9be64906901f5dc930b1e9
-
SSDEEP
768:I8fXlAgNqrm5GrLL4T6kPZdjpstFdMC6GBT/V:6gom5GU3PLjw6Q
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023457-6.dat acprotect -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1156 rundll32.exe -
resource yara_rule behavioral2/memory/4272-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4272-5-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/files/0x0007000000023457-6.dat upx behavioral2/memory/1156-8-0x0000000010000000-0x0000000010106000-memory.dmp upx behavioral2/memory/1156-9-0x0000000010000000-0x0000000010106000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ins = "Olimpk.dll," rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SfcDisable = "4294967197" rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kance.dll a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe File created C:\Windows\SysWOW64\Olimpk.dll a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe File created C:\Windows\SysWOW64\myCfg.nls a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5096 1156 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1156 4272 a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe 86 PID 4272 wrote to memory of 1156 4272 a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe 86 PID 4272 wrote to memory of 1156 4272 a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe 86 PID 1156 wrote to memory of 1112 1156 rundll32.exe 87 PID 1156 wrote to memory of 1112 1156 rundll32.exe 87 PID 1156 wrote to memory of 1112 1156 rundll32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Olimpk.dll,init C:\Users\Admin\AppData\Local\Temp\a00ec201154552f2403d645e5d3f8cd2_JaffaCakes118.exe2⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\sfc.exe"C:\Windows\system32\sfc.exe" /REVERT3⤵
- System Location Discovery: System Language Discovery
PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 12323⤵
- Program crash
PID:5096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1156 -ip 11561⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD58a81e3c8e5a29e94d73b5fe43ffc9283
SHA1ce85552c7104276c08ffa7088affab2ac39620ef
SHA256524775d2fceca57252815c2cf7dc19b0669935bc062d44a3431587ee99ba352d
SHA512ee06876d45c0b46abde0fb8bc97aa23b6a47c8f27e9a073a9c27b252f7e0993bacb38fb871b8b76313f012715bb13746483ae27cc04b92d2c41b6f5b71349053