Analysis
-
max time kernel
141s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe
-
Size
249KB
-
MD5
b2e31271842e51ce16a7f5a0d8a4f021
-
SHA1
434d8ee87c3207f101ed911820d30771ccf14d02
-
SHA256
9be6d4bf9f0df063bf1391ffe42a828356543a5fd967a3884d24c6eba4941f38
-
SHA512
7b054cbcd353abd0f1bdbddcabf973bfb424d168df81c14eae8680c65abd51c40ebf5512742d27c36a37a8c8232ad38b7f384093e2652c73d05a3930587ef777
-
SSDEEP
6144:SU1+IjeemhtPhICjTeNhiO+E2gC4sLkydT8PZqEXPhT/:Su1Semh5DjTCsE2gLoIvPh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2140 crntclslic.exe -
Loads dropped DLL 6 IoCs
pid Process 1848 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crntclslic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2140 1848 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2140 1848 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2140 1848 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2140 1848 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 30 PID 2140 wrote to memory of 1248 2140 crntclslic.exe 31 PID 2140 wrote to memory of 1248 2140 crntclslic.exe 31 PID 2140 wrote to memory of 1248 2140 crntclslic.exe 31 PID 2140 wrote to memory of 1248 2140 crntclslic.exe 31 PID 2140 wrote to memory of 1248 2140 crntclslic.exe 31 PID 2140 wrote to memory of 1248 2140 crntclslic.exe 31 PID 2140 wrote to memory of 1248 2140 crntclslic.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\crntclslic\crntclslic.exeC:\Users\Admin\AppData\Roaming\crntclslic\crntclslic.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\CRNTCL~1\CRNTCL~1.DLL 0003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD571759ccf673e17bf033d7c34fe40fec1
SHA19960c38398bcdf4ad23e19966e56ac630b888c63
SHA2560bb9d4dfedf25f026028b5f94125e63858f6c2d8889b7378eff74492ca1b6b0d
SHA512280963a3c01b48f4f112ec1bf4a798856ddb2148baaafd541814580139a81ff41ed1e9308c4d2713d5a04f9cbd7e40735afaadc5b8e5a4a584096cba7b84d6bf
-
Filesize
160KB
MD52b9bc21f9acd409e3decb8572b9b9edf
SHA1a98ce0a189ef8f7c6ddb5e97d8069ab96eee6359
SHA2560cc79c8f82ad762c7331cc0a5107d309a063ba7184493016a799f79bb4ea7bc8
SHA512df914ab8e8738eb400ef749145a73811a44b4155962b191908a101c023e99267959b8afbbd8d3c486389d6f16cf5c7220ec0f1e3eaf66e68265cd882bcb24d68
-
Filesize
249KB
MD5b2e31271842e51ce16a7f5a0d8a4f021
SHA1434d8ee87c3207f101ed911820d30771ccf14d02
SHA2569be6d4bf9f0df063bf1391ffe42a828356543a5fd967a3884d24c6eba4941f38
SHA5127b054cbcd353abd0f1bdbddcabf973bfb424d168df81c14eae8680c65abd51c40ebf5512742d27c36a37a8c8232ad38b7f384093e2652c73d05a3930587ef777