Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe
-
Size
88KB
-
MD5
bdd7d07587d585f9ed520a900240e7a8
-
SHA1
fab101681c49fa2f9e41e536373a7a6b6ea042d7
-
SHA256
6690cd20fdcf68bb82c18613c371643263b7dc70143fda0578767aca1fac416a
-
SHA512
e08e3a65a10eccbf0084407c97adc8be0336e208b27ecd92d978cd2b1da4c1f0e00bcb0b7304cbf932a843f35993b0a8545eda5c3fa10125382389ca1a9da2e8
-
SSDEEP
1536:mQntytdNg6b3BkPA0zOxP6k11KbfMaceGB1RRHrXSYVQg4ptXIW:nnIjCY0zOkkDKbflcfB1gg4ptXIW
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4836 rundll32.exe 1472 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kweboyobuboboge = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\LoweDe.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe 4836 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3132 wrote to memory of 4836 3132 bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe 84 PID 3132 wrote to memory of 4836 3132 bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe 84 PID 3132 wrote to memory of 4836 3132 bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe 84 PID 4836 wrote to memory of 1472 4836 rundll32.exe 98 PID 4836 wrote to memory of 1472 4836 rundll32.exe 98 PID 4836 wrote to memory of 1472 4836 rundll32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\LoweDe.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\LoweDe.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD57e55e9d2cd1edf66058b7cd0b2e59118
SHA1afc1106061dbc7ddb29780c4e9df2efe5fc9f4ce
SHA25678ffaeec51761ba68bc19af977b1ac018d236b015b7394f28dd286179026c6ee
SHA5126809516c6844126442a2b9a7de9dc5531b9f93ea448d911a524e2d76e9e80a95bb96142227f7a39cf185eafe8108ce418f8dcc3cdff51407eef3adec555f0752