Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
c20245dc60e3b802675db4c58eb8a969
-
SHA1
c0048e2c7c60aff0365318ccac1e7a92b6bfc206
-
SHA256
8572fd4106f2f586043a93d7627c1f47adae710923e6e55aa1ff91976276018a
-
SHA512
37a7b350218a5f955c8ad3e9dd638f61cb9ed3c04fb39452572bd28f6b037ee731e26abaaacfa3f50996b1d250f1ef6470a3329242f995cf2b1782649d55b223
-
SSDEEP
49152:KaQRibZEQmRZKL8iecS//Ll9Ae5WEb7JZ:K5RibSpfcUB9cEb7T
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3820 dnfsy.dll 4852 dfdat.exe -
Loads dropped DLL 1 IoCs
pid Process 3820 dnfsy.dll -
resource yara_rule behavioral2/files/0x0009000000023360-2.dat upx behavioral2/memory/3820-4-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-18-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-20-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-21-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-22-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-23-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-24-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-25-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-26-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-27-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-28-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-29-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-30-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-31-0x0000000000400000-0x000000000076E000-memory.dmp upx behavioral2/memory/3820-32-0x0000000000400000-0x000000000076E000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\SkinH_EL.dll dnfsy.dll -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnfsy.dll Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfdat.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.dnfshaoye.com" c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4852 dfdat.exe 4852 dfdat.exe 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll 3820 dnfsy.dll -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 3820 dnfsy.dll 3820 dnfsy.dll -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 616 wrote to memory of 3820 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 84 PID 616 wrote to memory of 3820 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 84 PID 616 wrote to memory of 3820 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 84 PID 616 wrote to memory of 4852 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 88 PID 616 wrote to memory of 4852 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 88 PID 616 wrote to memory of 4852 616 c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c20245dc60e3b802675db4c58eb8a969_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\dnfsy.dllC:\Users\Admin\AppData\Local\Temp\dnfsy.dll2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\dfdat.exeC:\Users\Admin\AppData\Local\Temp/dfdat.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5b97422f93b63f07746314b9d405d93a0
SHA12cf6b8145d407466e49eadfa7b362a40aa0c8f80
SHA2564c982cd6a4ed1faddf50965f2e7028a2799626ef1e692919f4f59600a577cb72
SHA5129534763d64fbc401b008b96f8bd32d0bd33cd96e60c8343042eb023d420ec2e7e206970ba14a4714a7fa6f3058ed83d6ebadb98e0da371968396bdd2409d9983
-
Filesize
1.5MB
MD5f8a53e5506e8460882c10e0346ca3707
SHA1bcb47e0b2e97190c02c5894c187fa2e17dd517d8
SHA256de80d3c1ddd7ad72c4d4579623265d7970e85a3c62c2ba4fe09a6f885d02556b
SHA5121624024b4573c3a18c00eab7ef9b2f5fd941217dfd855d7a9869a1b2e9a8af2183a5241f145629971c94974b0b0de6200c7d03abdffc4cefc1efa7e338b55691
-
Filesize
688KB
MD5bd42ef63fc0f79fdaaeca95d62a96bbb
SHA197ca8ccb0e6f7ffeb05dc441b2427feb0b634033
SHA256573cf4e4dfa8fe51fc8b80b79cd626cb861260d26b6e4f627841e11b4dce2f48
SHA512431b5487003add16865538de428bf518046ee97ab6423d88f92cda4ff263f971c0cf3827049465b9288a219cc32698fd687939c7c648870dd7d8d6776735c93c