Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe
-
Size
32KB
-
MD5
cfa832be118048f902dfe3d77204b880
-
SHA1
1b211f788bb1aeb3f3cf850b13f9c150a76d9d01
-
SHA256
c0cd70f52e86f85792e4567ffb7a37bdea3ef832bfaed4aec8633424a979c7e2
-
SHA512
fde54255f9d13482d60775129b91c728eb9ec120d73f7cbf7abebfbb03e348df9bbd3bf713284cb578b41342b2f3dfb619ca1a51f62ed882fcd18f50f941d93e
-
SSDEEP
384:oyiiKCBWDjUYScXR/NDNVLI1+JUh61411brxBKvkDdir06Lms:blKCMDjtHJdmPTbrDKv+8r0MH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2236 DL.exe 2232 DL.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\windows\SysWOW64\DL.exe cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\DL.exe cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\DL.Exe DL.exe File created C:\windows\SysWOW64\DL.exe DL.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DL.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1256 cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe 2236 DL.exe 2232 DL.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2236 1256 cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe 83 PID 1256 wrote to memory of 2236 1256 cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe 83 PID 1256 wrote to memory of 2236 1256 cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe 83 PID 2236 wrote to memory of 2232 2236 DL.exe 85 PID 2236 wrote to memory of 2232 2236 DL.exe 85 PID 2236 wrote to memory of 2232 2236 DL.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfa832be118048f902dfe3d77204b880_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\windows\SysWOW64\DL.exeC:\windows\system32\DL.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\windows\SysWOW64\DL.exeC:\windows\system32\DL.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5cfa832be118048f902dfe3d77204b880
SHA11b211f788bb1aeb3f3cf850b13f9c150a76d9d01
SHA256c0cd70f52e86f85792e4567ffb7a37bdea3ef832bfaed4aec8633424a979c7e2
SHA512fde54255f9d13482d60775129b91c728eb9ec120d73f7cbf7abebfbb03e348df9bbd3bf713284cb578b41342b2f3dfb619ca1a51f62ed882fcd18f50f941d93e