Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe
-
Size
249KB
-
MD5
b2e31271842e51ce16a7f5a0d8a4f021
-
SHA1
434d8ee87c3207f101ed911820d30771ccf14d02
-
SHA256
9be6d4bf9f0df063bf1391ffe42a828356543a5fd967a3884d24c6eba4941f38
-
SHA512
7b054cbcd353abd0f1bdbddcabf973bfb424d168df81c14eae8680c65abd51c40ebf5512742d27c36a37a8c8232ad38b7f384093e2652c73d05a3930587ef777
-
SSDEEP
6144:SU1+IjeemhtPhICjTeNhiO+E2gC4sLkydT8PZqEXPhT/:Su1Semh5DjTCsE2gLoIvPh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2212 crntclslic.exe -
Loads dropped DLL 3 IoCs
pid Process 3712 rundll32.exe 3712 rundll32.exe 3712 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3992 3712 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crntclslic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3108 wrote to memory of 2212 3108 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 86 PID 3108 wrote to memory of 2212 3108 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 86 PID 3108 wrote to memory of 2212 3108 b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe 86 PID 2212 wrote to memory of 3712 2212 crntclslic.exe 87 PID 2212 wrote to memory of 3712 2212 crntclslic.exe 87 PID 2212 wrote to memory of 3712 2212 crntclslic.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2e31271842e51ce16a7f5a0d8a4f021_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Roaming\crntclslic\crntclslic.exeC:\Users\Admin\AppData\Roaming\crntclslic\crntclslic.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\CRNTCL~1\CRNTCL~1.DLL 0003⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 7444⤵
- Program crash
PID:3992
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3712 -ip 37121⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD571759ccf673e17bf033d7c34fe40fec1
SHA19960c38398bcdf4ad23e19966e56ac630b888c63
SHA2560bb9d4dfedf25f026028b5f94125e63858f6c2d8889b7378eff74492ca1b6b0d
SHA512280963a3c01b48f4f112ec1bf4a798856ddb2148baaafd541814580139a81ff41ed1e9308c4d2713d5a04f9cbd7e40735afaadc5b8e5a4a584096cba7b84d6bf
-
Filesize
160KB
MD52b9bc21f9acd409e3decb8572b9b9edf
SHA1a98ce0a189ef8f7c6ddb5e97d8069ab96eee6359
SHA2560cc79c8f82ad762c7331cc0a5107d309a063ba7184493016a799f79bb4ea7bc8
SHA512df914ab8e8738eb400ef749145a73811a44b4155962b191908a101c023e99267959b8afbbd8d3c486389d6f16cf5c7220ec0f1e3eaf66e68265cd882bcb24d68
-
Filesize
249KB
MD5b2e31271842e51ce16a7f5a0d8a4f021
SHA1434d8ee87c3207f101ed911820d30771ccf14d02
SHA2569be6d4bf9f0df063bf1391ffe42a828356543a5fd967a3884d24c6eba4941f38
SHA5127b054cbcd353abd0f1bdbddcabf973bfb424d168df81c14eae8680c65abd51c40ebf5512742d27c36a37a8c8232ad38b7f384093e2652c73d05a3930587ef777