Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe
-
Size
472KB
-
MD5
9e621faf9f9d751999f1193c02ca5577
-
SHA1
9fa5239819f052bac418c0c6be4d93530ab6439d
-
SHA256
a28ddf7248cb96a79b5b4b4d942dbdcffb3f81ced96f2810a1718ebd90eb6000
-
SHA512
68ff72eadd0a8df27a6a3d1e89bb27026140687a6dd0d94dbd53ccfba3f8a26721347cc410234d4b7ae63796bfec582332fbd01d50685d2e302f3b0d3a96c503
-
SSDEEP
12288:/y50zvBXPNefIIjliHmgtX8ujE6kpfjBzHTChE:o0GvinIDfjxz4
Malware Config
Extracted
systembc
paladin5.com
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4116 rkpjrl.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\proc.dmp rkpjrl.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\corolina17.job 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe File created C:\Windows\Tasks\corolina17.job 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkpjrl.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 4116 rkpjrl.exe 4116 rkpjrl.exe 4116 rkpjrl.exe 4116 rkpjrl.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 4116 rkpjrl.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3700 9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe 4116 rkpjrl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e621faf9f9d751999f1193c02ca5577_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3700
-
C:\ProgramData\tsavj\rkpjrl.exeC:\ProgramData\tsavj\rkpjrl.exe start21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD59e621faf9f9d751999f1193c02ca5577
SHA19fa5239819f052bac418c0c6be4d93530ab6439d
SHA256a28ddf7248cb96a79b5b4b4d942dbdcffb3f81ced96f2810a1718ebd90eb6000
SHA51268ff72eadd0a8df27a6a3d1e89bb27026140687a6dd0d94dbd53ccfba3f8a26721347cc410234d4b7ae63796bfec582332fbd01d50685d2e302f3b0d3a96c503