Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe
-
Size
100KB
-
MD5
b4c540b1e8f598931cb678499f195da3
-
SHA1
90b8658e3f7dfa2d859416ec79fc435583309ed7
-
SHA256
0461dfd946bcf53a4cb1aaacd4e16bdd931c4770980c9dca32908ade67215a83
-
SHA512
0083b4907e158d819790f326dbfe7cfe7a5362724e1e4408f9c8d1cc9b622564eead699ce019c0e04264faeaf3efb829e06ec4fb71379830662d40414d01e6cb
-
SSDEEP
1536:uxlc7A72Uziq3igvI+Ggcj9m6HarshoEpjXFjaoBnqyS:qwM3igIqcj9zfogdBnqyS
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4108 rundll32.exe 3932 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tmepamete = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\UITrde.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe 4108 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4108 3104 b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe 84 PID 3104 wrote to memory of 4108 3104 b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe 84 PID 3104 wrote to memory of 4108 3104 b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe 84 PID 4108 wrote to memory of 3932 4108 rundll32.exe 97 PID 4108 wrote to memory of 3932 4108 rundll32.exe 97 PID 4108 wrote to memory of 3932 4108 rundll32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4c540b1e8f598931cb678499f195da3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\UITrde.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\UITrde.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5a302bcdd2e586ea5f1c3a5857c14b494
SHA11b4e60b9a763269c2b8f3c6d524ea6eb2a1d7583
SHA256594174f50253230b8018c5de00ea8a34be364f22dd59484497e32ed80cd5144f
SHA51246a29005f9de3a22ec1717380a221066b49818a471a7a8a3d7973aca1bcc48f450a7bac3a6dca1acab268504b0dd9a283a2453aa7225fd49886de48d54f3b3ac