Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe
-
Size
47KB
-
MD5
c26413866339f9fa5481ca81d69d2786
-
SHA1
f626bd14616244e27039b4fce3a37c07595a34e4
-
SHA256
74e09a7cc98c2138aa2c158f0877865c2928d5e37322c7444eb65eeb6967dc59
-
SHA512
443e3da037890c11ee8d7d6ac449ac1b9a86e0bc9b54d8b77d00bae39c8c1abc717c0f88389b39d34b26449a1ec6a1dd6e862eb3ee3e3623c335aebd66e88964
-
SSDEEP
384:dw0cbAUsKi3Bbh5vD91g/6e9JdYiTQH18eAHU6smAAcnZKh4lcW:i0HB3FHvvxe/dYpH187HEZA3y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2360 Rundll32.exe 2360 Rundll32.exe 2360 Rundll32.exe 2360 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\npjzjb = "RUNDLL32.EXE C:\\Windows\\system32\\mszdltsg.dll,w" Rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2360 Rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2360 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2360 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2360 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2360 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2360 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2360 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2360 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2332 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2332 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2332 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2332 2120 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Windows\system32\mszdltsg.dll,w2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2360
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259433812.BAT" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD56177977a311b6b47cd2536e1a16f0411
SHA153ae6da2d05fea7afb35e154af397cc66de39c7f
SHA25602c928eb6f7708f119c98d483e0aa1b4c52a471b6d70321f0aaa47780947f565
SHA512391d62368321aef4fea0f95fe96428b11740e12ccc9154705b4a45c535c90a69b4e046994fb406d808b9265bdae1d842cc45fc2ef58491ffd687d1873aa58cc7
-
Filesize
36KB
MD5fb31db7fbd72008bc900a6b3d34c8398
SHA110dd102022bb02d93050e19327029e6d450e64b6
SHA2569f9e53bf1fbc5e4d4a874a498e961fc1f56be84b4931542e296d0ada479f038c
SHA51250909bf95b434c6572b740a0f333b28d12b9e6bd753866251fcbe087a8fbf2f71445831515ca048340302109547f22d562cc59dc3b605b79407ae1611cea9eb2