Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe
-
Size
769KB
-
MD5
ba4a82da26efd4bfa3244b44e5c5aaf8
-
SHA1
764489f85bc9588d72c5597ed1872fcb914b73c4
-
SHA256
09043cb283dc24bb0ce295df14c408d17a7694329c1e7931e6f1188a86af3458
-
SHA512
d34ec212f1568469387e65a8e946803ff8980a76ab2a2340fade82b27905fc14540b542cd0b2a73f4de3c80ba3c10fbd6febeda80d8a407fa39a35e3025de4cf
-
SSDEEP
12288:UwsMFNyN90FiwIkHD1ye5vmP6ar/Q9mYeI6iTgqeuO4If1AO/OJ:Uj1N9kXIuDVmy4YqITgdu/I9d/O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3980 update.exe -
Loads dropped DLL 4 IoCs
pid Process 4812 ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe 3980 update.exe 3980 update.exe 3980 update.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wcmlogon.dl_ ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe File created C:\Windows\SysWOW64\wcmlogon.dll ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\KB888111.log update.exe File opened for modification C:\Windows\setupapi.log update.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4812 ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe 4812 ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe 3980 update.exe 3980 update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4812 ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3980 4812 ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe 84 PID 4812 wrote to memory of 3980 4812 ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe 84 PID 4812 wrote to memory of 3980 4812 ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba4a82da26efd4bfa3244b44e5c5aaf8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\0f2ecfc267dd3248238e4dcf6493cca6\update\update.exec:\0f2ecfc267dd3248238e4dcf6493cca6\update\update.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD53c2a09832c83498e3bae458c84175377
SHA1a1478d8e0ad041229aefe92c8c69de031524e00c
SHA256485ec185a2a0d06e792902040a75c583c2e455a73fb3f72072d0fb082bcf0a1e
SHA5129bdd9bd21a5618e7add3384a2f15c9a7f0d5af0cfa5a4156cb914019197b1719d3b3e8cf7f4a2cd225adbcd6cf1d40473d46923de8de5be024fe7b447c0e664c
-
Filesize
320KB
MD5948d88cce2bd9d41b4c9a5312f5db34d
SHA1861febf1c21085bbda1e02e898c6f3357784cde8
SHA256d3bf7a6d373e14c73d45da671ef11a77ae8168946b8198856398bff2d767450f
SHA512001573e8016e077b6dc9b0eff393219813524ced901a31560736b01352080b403c40011e7aed7bca586be1f7f0a99c1ff245d47efc904340de22de3c065dd643
-
Filesize
675KB
MD5ca36e528bf0d3b91ed7e42ed4aa9978c
SHA1c8d41552a9b98a57282092a89e88aa9243374ccb
SHA256dd75bccc7cc3561cde32be6cbfd75cf9e7b9edca11329801d0db7082d5547a92
SHA5127614205831588c462421ff6497fad4ff6fd5dbc11ea3f317bb07e59f41d79649ad1c84d38b73a489b9a8ecef556515e60abfd506f12e8e96e6c6156fb9889625
-
Filesize
8KB
MD54c53a34b95e96f66524a2430440ddd91
SHA146a60e5c267093ec6e73f3926ca8f44ca823dfd6
SHA25636ed5022fe71ea4a8e5a60157c201d89651a530b899f52b93b152a8be2996194
SHA512cbf4f506bbdc25516a6fb25cb0b04a77132fd2d3c0b22483939e7a87547ff0fb952aaa825700b05b596b9c2eb7a8480e0f48ab17cc314f861dbd07112af669bd