Analysis
-
max time kernel
136s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe
-
Size
43KB
-
MD5
cdf37bdbb1fd8e9ff085285960649e50
-
SHA1
a82c5a889e3dd5d1bc19f453ed6bf143cf9c8bb7
-
SHA256
145a9f820f2b9fbb5589ce32b0a3e69fe50c1de791f633323950b6225293c9a7
-
SHA512
5c414d9e7092f2ab2520d29442f8d9bc5a37d96ac1a403447b709a59bc6e68fe15163535a433a441dd07268d9b0789170d92eaf966e093336ddbb46513acca4c
-
SSDEEP
768:sbTqavYjTvEBTfVDAyNX8PFOJ40feIaFzSUqSH3Uxd:sbTqBjT8fhAyF8NKeIaJExd
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 796 set thread context of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\u7bD2k.com cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\u7bD2k.com cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3808 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 3808 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88 PID 796 wrote to memory of 3808 796 cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdf37bdbb1fd8e9ff085285960649e50_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4388