Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe
-
Size
13KB
-
MD5
c0e4dd20e4649bf7796d5a06ec562041
-
SHA1
8a4ba77abbb08ec80933fb43b0db726b06409fd3
-
SHA256
8d73abb2f43b7f34791afe772a51812c6b88de095bb1da872593453001d32c0b
-
SHA512
c8c2f7f1932a4f36e28d360e8aee45d3d2ea4f1f8d20640120c676bbe0e802bf19ef48ebad0e6bdc17c8b6897cf557813fb12e43099f38a0e19d7f6e76cf73e0
-
SSDEEP
384:vGm8Ynsn4CVEHjPc4AKVcOZNXjKUW1XLqg/FZrD6d9:em8Ys4/bc4A0cOZN+UW1XTFZrD6b
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dispexcb.dll = "{76D44356-B494-443a-BEDC-AA68DE4255E6}" c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dispexcb.tmp c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dispexcb.tmp c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dispexcb.nls c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32\ThreadingModel = "Apartment" c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6} c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32\ = "C:\\Windows\\SysWow64\\dispexcb.dll" c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2780 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe 30 PID 1080 wrote to memory of 2780 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe 30 PID 1080 wrote to memory of 2780 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe 30 PID 1080 wrote to memory of 2780 1080 c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0e4dd20e4649bf7796d5a06ec562041_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\42AB.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD544b6b86df8542bac1047eed392ae119b
SHA1fabaf64a37911118358903b56cf12d2bc348b0d9
SHA2568e6cf69baf773b13f3dc88d6c67af9c3a6c8c851530c7eb623d68a23a60bf25b
SHA5128d76f0c4b1a75c66b431a3fd8d45b7bf86161467ae0ae3cf6e83dfc5335ce42154484d2d50815ce4f145cbd108614db15d57fcbd7de620681240313549d31765
-
Filesize
800KB
MD57b6def46901d2675ba8642954dcfb5e5
SHA1626da7e9f631ea5f3ab19d23ab8126a4b9632330
SHA25645d9b27e3d6ce8e0569f67635cf8635fd89350865b1a0f71396c2ee25f175d3c
SHA5120c37b062fb6cab7a6b5ed42e15f8bfdf32e0b79dc05f84ef38ef90c58e8200b80fd8e6151afe7ac12d49fd9d78762be1e415b7549790e1fd940129483e4f57a3