Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
b6992046308026e8ecfd916635f01945_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6992046308026e8ecfd916635f01945_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6992046308026e8ecfd916635f01945_JaffaCakes118.exe
-
Size
86KB
-
MD5
b6992046308026e8ecfd916635f01945
-
SHA1
1a36db1defc0304d3f54e205bbddc5e08b6324b5
-
SHA256
fa0484efa5836a1bc35fcc7a1f7785f01a413a11472fcfe2d402517d5633d298
-
SHA512
16f9145110803c106246d9a30d8a2ba4fc423a6ad9998e4279fede845801a03bf0733926136beea46963334432d4c20054a348b3ca5b7c6b682308f1c5e9c7d9
-
SSDEEP
1536:DtQZ47o9eahVeYav9RA9AMcRJ81FGCHOaOrAUySTQJ:Di6WTGRQcRJ81cCHOaOrAUySTQJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1668 hlonlfkf.exe -
Executes dropped EXE 2 IoCs
pid Process 1668 hlonlfkf.exe 2724 hlonlfkf.exe -
Loads dropped DLL 2 IoCs
pid Process 2488 b6992046308026e8ecfd916635f01945_JaffaCakes118.exe 1668 hlonlfkf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PC Health Status = "C:\\Users\\Admin\\AppData\\Roaming\\hlonlfkf.exe" hlonlfkf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\PC Health Status = "C:\\Users\\Admin\\AppData\\Roaming\\hlonlfkf.exe" hlonlfkf.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlonlfkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6992046308026e8ecfd916635f01945_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlonlfkf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1668 2488 b6992046308026e8ecfd916635f01945_JaffaCakes118.exe 29 PID 2488 wrote to memory of 1668 2488 b6992046308026e8ecfd916635f01945_JaffaCakes118.exe 29 PID 2488 wrote to memory of 1668 2488 b6992046308026e8ecfd916635f01945_JaffaCakes118.exe 29 PID 2488 wrote to memory of 1668 2488 b6992046308026e8ecfd916635f01945_JaffaCakes118.exe 29 PID 1668 wrote to memory of 2724 1668 hlonlfkf.exe 30 PID 1668 wrote to memory of 2724 1668 hlonlfkf.exe 30 PID 1668 wrote to memory of 2724 1668 hlonlfkf.exe 30 PID 1668 wrote to memory of 2724 1668 hlonlfkf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6992046308026e8ecfd916635f01945_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6992046308026e8ecfd916635f01945_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\hlonlfkf.exe"C:\Users\Admin\AppData\Roaming\hlonlfkf.exe" *kmfdm* C:\Users\Admin\AppData\Local\Temp\B69920~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\hlonlfkf.exe"C:\Users\Admin\AppData\Roaming\hlonlfkf.exe" PNPK3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5b6992046308026e8ecfd916635f01945
SHA11a36db1defc0304d3f54e205bbddc5e08b6324b5
SHA256fa0484efa5836a1bc35fcc7a1f7785f01a413a11472fcfe2d402517d5633d298
SHA51216f9145110803c106246d9a30d8a2ba4fc423a6ad9998e4279fede845801a03bf0733926136beea46963334432d4c20054a348b3ca5b7c6b682308f1c5e9c7d9