Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe
-
Size
13.6MB
-
MD5
d0563cb3c7aa6d5ee73edfa2acdb8ab1
-
SHA1
7572c995926524332c81a64682cf21bda26a83b2
-
SHA256
701337aeec59e62e19324ccd027966fc6f09134fbcb8ea8fcc60db96b294d84a
-
SHA512
46ca58ff0bcc22a4e58f1211413cba331f136f397e280e00b67cb6300242b0c55783ab0d0dc73d3d6e7dfb79ad1725eacdea9384ae2eedf121a1acb56922bdd5
-
SSDEEP
192:c2/2VgqKGxmQtAy2dNQOa099GfsvYgmhT9zHJxhlQtAwimP1oyG+Ra4:c2/vg0xlGHjRNvQtAjQ14+l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\Googlenk.exe" Googlenk.exe -
Deletes itself 1 IoCs
pid Process 536 Googlenk.exe -
Executes dropped EXE 2 IoCs
pid Process 3176 Googlenk.exe 536 Googlenk.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Debugs.inf d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe File created C:\Windows\Googlenk.exe d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe File opened for modification C:\Windows\Googlenk.exe d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe File created C:\Windows\Debugs.inf Googlenk.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Googlenk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Googlenk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2984 2240 d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe 83 PID 2240 wrote to memory of 2984 2240 d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe 83 PID 2240 wrote to memory of 2984 2240 d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe 83 PID 2984 wrote to memory of 3176 2984 d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe 87 PID 2984 wrote to memory of 3176 2984 d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe 87 PID 2984 wrote to memory of 3176 2984 d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe 87 PID 3176 wrote to memory of 536 3176 Googlenk.exe 88 PID 3176 wrote to memory of 536 3176 Googlenk.exe 88 PID 3176 wrote to memory of 536 3176 Googlenk.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0563cb3c7aa6d5ee73edfa2acdb8ab1_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\Googlenk.exe"C:\Windows\Googlenk.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\Googlenk.exe"C:\Windows\Googlenk.exe"4⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5c23c22dc4fc9c130318debeea01d10cc
SHA12d3208c829e62dd5bb597f630734d37c8709befd
SHA256f2fa083c809b87244f666da1e2f94b4e117df01d5505f551d5232c76c8316629
SHA5122834e0481f271fc494577496a005a34b36648134c04a1ae800dea1d39b29da48c0bd7f3924ba4d93e8685db126fed04c627c414bdcef07c7d99b29931364e685
-
Filesize
22.4MB
MD5bd803e095733f5d14556696e1c92e0f1
SHA1c691182ba6fe5ecae2246483a5f3f7eb15e76b4e
SHA2566dca03a752619045872ad86b63568ca962ed5d0298db46b7741626dba0f57e00
SHA512cbc85e7958c749aab2d5abf79ae7ac7f3d0b4e3d2d62660b2b60d08795cc0c6a3cec048683db0e1b7f5a5608c6954d2589de593b236b6b5926191f21a2a7dbb5