Analysis
-
max time kernel
134s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe
-
Size
13KB
-
MD5
b2331a57a1f93fce1c856ad4d39510dc
-
SHA1
44aa8d5a7d0f3e4709697e8409cfddfd37364a40
-
SHA256
f5e7351f74d4262cfd1bf807fe8b10dc04d98b65b788d54bcb78cf6b33716f7a
-
SHA512
ab837603fc64d366adc54d4f5dc1f79d7cc34bbce92fe1ea6793ddb342459468859259b75b4f121ab3cd38a83259281968c9d18f67c25fec4b8bd6a7602a2210
-
SSDEEP
384:U9AUK3nV69Klt752cCOQrXaKGw1jVGgSJpzC/:FV6Ml5ZQLa4Qm/
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ocashbgo.dll = "{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}" b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ocashbgo.tmp b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ocashbgo.tmp b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ocashbgo.nls b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32\ThreadingModel = "Apartment" b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA} b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0F3526A-4165-4589-80CD-50B6FBAC3BDA}\InProcServer32\ = "C:\\Windows\\SysWow64\\ocashbgo.dll" b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 452 wrote to memory of 1412 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe 96 PID 452 wrote to memory of 1412 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe 96 PID 452 wrote to memory of 1412 452 b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2331a57a1f93fce1c856ad4d39510dc_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\EDFA.tmp.bat2⤵
- System Location Discovery: System Language Discovery
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD547fae0d3f5224a51a5739db37da9845a
SHA16b1f331c76204677acd73ee2b574db7d87c0efc4
SHA256330089e52d06268026abd3227212e1d67a9d42802e432e19d868e882868decc0
SHA512ccdac05b42ddfb0eabc82b9368ec082bcf738a2028d42a3391e5e24e5be2064a3c82a69f75c451f0e008f107ffc208db120a7e2c83e67306a1660dc87580896b
-
Filesize
2.4MB
MD53f73d8fb67edf2e4456279b0c459477e
SHA1319af9b9863a9cd398d55e585c8027a7035e9942
SHA2569127226628a7503def9d6a095f616d2fd3544eebd90c124bca620d8aabd636ff
SHA5129e9204689fef84105427986584e3f803013d44e252c18e20c7fd609f835318d2dacac1d8a11431f5eb24c0bf8de91c8676dd03b71db326740c3a88015730cc82