Analysis
-
max time kernel
92s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe
-
Size
47KB
-
MD5
c26413866339f9fa5481ca81d69d2786
-
SHA1
f626bd14616244e27039b4fce3a37c07595a34e4
-
SHA256
74e09a7cc98c2138aa2c158f0877865c2928d5e37322c7444eb65eeb6967dc59
-
SHA512
443e3da037890c11ee8d7d6ac449ac1b9a86e0bc9b54d8b77d00bae39c8c1abc717c0f88389b39d34b26449a1ec6a1dd6e862eb3ee3e3623c335aebd66e88964
-
SSDEEP
384:dw0cbAUsKi3Bbh5vD91g/6e9JdYiTQH18eAHU6smAAcnZKh4lcW:i0HB3FHvvxe/dYpH187HEZA3y
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3748 Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\npjzjb = "RUNDLL32.EXE C:\\Windows\\system32\\mszdltsg.dll,w" Rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3748 Rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1268 wrote to memory of 3748 1268 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 85 PID 1268 wrote to memory of 3748 1268 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 85 PID 1268 wrote to memory of 3748 1268 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 85 PID 1268 wrote to memory of 2168 1268 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 92 PID 1268 wrote to memory of 2168 1268 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 92 PID 1268 wrote to memory of 2168 1268 c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c26413866339f9fa5481ca81d69d2786_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Windows\system32\mszdltsg.dll,w2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240617984.BAT" "2⤵
- System Location Discovery: System Language Discovery
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD56177977a311b6b47cd2536e1a16f0411
SHA153ae6da2d05fea7afb35e154af397cc66de39c7f
SHA25602c928eb6f7708f119c98d483e0aa1b4c52a471b6d70321f0aaa47780947f565
SHA512391d62368321aef4fea0f95fe96428b11740e12ccc9154705b4a45c535c90a69b4e046994fb406d808b9265bdae1d842cc45fc2ef58491ffd687d1873aa58cc7
-
Filesize
36KB
MD5fb31db7fbd72008bc900a6b3d34c8398
SHA110dd102022bb02d93050e19327029e6d450e64b6
SHA2569f9e53bf1fbc5e4d4a874a498e961fc1f56be84b4931542e296d0ada479f038c
SHA51250909bf95b434c6572b740a0f333b28d12b9e6bd753866251fcbe087a8fbf2f71445831515ca048340302109547f22d562cc59dc3b605b79407ae1611cea9eb2