Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe
-
Size
116KB
-
MD5
b6b63bfdeb1eee1d064154740bb4537b
-
SHA1
697b051358c1bb13c6148bba465bf5730d863d3d
-
SHA256
4777b209ee883640e1b054cf16ccae108e73be25c486c9f95ce526c34d558e33
-
SHA512
e83d30d5df1a7e2ef7cd8e8c4c0d7b3c0cd1f9f9c4d0321ee6bd2f0db98cc61195294231b699de00447672835e302cf8aead6905846e23ccbe70a4c4eb9a7fb2
-
SSDEEP
3072:ri0vfvw6W8fqVcAPGeAzxXlK9L7Ul9LwC3eXlozpI:rtXlWpOC7QF6aN
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe 2668 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kyeju = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\icronsa.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1904 1428 b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe 30 PID 1428 wrote to memory of 1904 1428 b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe 30 PID 1428 wrote to memory of 1904 1428 b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe 30 PID 1428 wrote to memory of 1904 1428 b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe 30 PID 1428 wrote to memory of 1904 1428 b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe 30 PID 1428 wrote to memory of 1904 1428 b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe 30 PID 1428 wrote to memory of 1904 1428 b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe 30 PID 1904 wrote to memory of 2668 1904 rundll32.exe 32 PID 1904 wrote to memory of 2668 1904 rundll32.exe 32 PID 1904 wrote to memory of 2668 1904 rundll32.exe 32 PID 1904 wrote to memory of 2668 1904 rundll32.exe 32 PID 1904 wrote to memory of 2668 1904 rundll32.exe 32 PID 1904 wrote to memory of 2668 1904 rundll32.exe 32 PID 1904 wrote to memory of 2668 1904 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6b63bfdeb1eee1d064154740bb4537b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\icronsa.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\icronsa.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD598447652fc4ac547254da221ead0cb4d
SHA1ec287547f50529026f7a5ad3a348cf4f72057609
SHA2568217a7450522629305a8ce6a142c4ac4e786e178d3166506338dbf5d11b63467
SHA512711ef4c7a74354886812546c80dacfb8f452fc296d1fbc0d8a60eab4025a6a6fe606db66f8fde066f94c1be595f043a37ab82fa65bda29f7a7cc37729673ce8f