Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe
-
Size
13KB
-
MD5
a0acbc800f424f097e86cc46f6dbc89d
-
SHA1
9ef7ccc0d652177355791c4a1f1243d7b0d04fd6
-
SHA256
0b97c2370eda2bef6f974851702c6cb95e997871498224d43c26152093d42c8b
-
SHA512
ee97bd3468dc4c097ec37dc7fd7400db2b142749ba0d6f273a528b7565f8e93dc8e773962f8cb9c4495d0de74a74f9af6e84a39a5492ae65544cad88c3c2aeee
-
SSDEEP
384:MKakE9pT5A6V6Z4LS6s/m5zLxDD6TBlgB:BBE9J5L6Zgsm5zLxDD6Tc
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\slbiopfs2.dll = "{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}" a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\slbiopfs2.tmp a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\slbiopfs2.tmp a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\slbiopfs2.nls a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A} a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}\InProcServer32 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}\InProcServer32\ = "C:\\Windows\\SysWow64\\slbiopfs2.dll" a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EB9660D8-E1CD-4ff0-B4A9-00CD907F928A}\InProcServer32\ThreadingModel = "Apartment" a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 208 wrote to memory of 5020 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 95 PID 208 wrote to memory of 5020 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 95 PID 208 wrote to memory of 5020 208 a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0acbc800f424f097e86cc46f6dbc89d_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\FAEA.tmp.bat2⤵
- System Location Discovery: System Language Discovery
PID:5020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5b29ffbdd4ffd7f18824fb1df9f1b0a76
SHA15ea562578a6a42ad2b652107f12cc6fe210dfa20
SHA25683aca7786088c40538ac7900038c365972d2c8b4146019234cbdeba3b4d9a4a8
SHA512629c7bd23ed1a737d4ef1023de82c154636443e1b696c4b7b6fe71e272d06e611abc5958cb5a2fb94a9c0650e104220a3cf00b3ddc46351cae39fd50cdabe880
-
Filesize
428B
MD5b3a3567571d4143c292cd004e4936f96
SHA161cca5c1984fe81d3f93cb97d1d4381001845244
SHA256fa9b2b45c2181f33e1a9445a4491e0c03cdf65f2722fe9123297c048599db89f
SHA512ae69fd9c8f38f56df7933cbef4ac0b9314e70b0899f267a8b347e370360a3b57dddcb37e892049c832660597a5722f44243044bbb62cc4cce29d8dc9294d6319
-
Filesize
2.3MB
MD542fee1bef3afc24a3c50cb1574eb7362
SHA1dc737097d0858800ec5653ea367aa425b92e0a17
SHA256a79cedfa08b613002359556a7fa0b4ea7451ca71f3fbb5bc2480d000b64ee2c3
SHA5128fe01884d57e6b2209c91fb1ba19ac883b8efc0a832e8dc4b3bd5d109baad12c7b55de38499962a7f3e20c509156f50d93b1d4a2b7596727925408baebd1adcf