Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe
-
Size
124KB
-
MD5
a5d2fcf790fba7b64cab6f4145fbfdd8
-
SHA1
7673cdc51e9d67302e9df4de5f5dcc640d9167e7
-
SHA256
737c6a4e8b62f1521b7932e1a9e4d377082be994c4caed49df12cc036971e08a
-
SHA512
f50dfe80d415cffd4a63dc1ff81393d57e605622e69038fb8553ef745688e474ad0b0e05c8c58cadbe03f32b5ce1c0190754e227165aaf5c980472ee46e933ef
-
SSDEEP
3072:0WQV6bMCnYEkZS+8WMh/UQ8QVc90DiKa3bv/s1q:LbzYZ+hbO90DiK4b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3344 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 1640 a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe 1640 a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe 3344 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\digpl = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\digpl.dll\",SHEvalHemisphereLight" a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1640 a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1640 wrote to memory of 3344 1640 a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe 96 PID 1640 wrote to memory of 3344 1640 a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe 96 PID 1640 wrote to memory of 3344 1640 a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5d2fcf790fba7b64cab6f4145fbfdd8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\digpl.dll",GetShaderVersion2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD59f52ab619091c0dc2489eb44f3922278
SHA1d2811a2b8757f43a2b034ae985c121271010a1bf
SHA2566351e942320e1eb316004b08b8c6f26ae926cc9f2e4d0d772853650b10e0d457
SHA512c3424ad9bc1cb46b50fba05e936edc59f296ab7c11e7606f48ca7f15982b9afbfabe8574ef2878f3576d77ca1ccac0dde8432786d0f00c5f992f7e8ed59e4881