Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe
-
Size
90KB
-
MD5
d0b8bfb08ed7f03e5467fa8bf9de3831
-
SHA1
2c41bbd2ecb81fc310244c22ec6921b54b962d45
-
SHA256
b4b33fa266678106423be8f08882a97d955d3b33faa7cfbccacca4fa31899f51
-
SHA512
6c6ec8c0e23237dfdff807c4eea2f9bbac91511173e53317727c240ab03a479f1ff5a2a02993e47c9471a97a1d01789e795d8536f2e529047faca41dc1f2d6e6
-
SSDEEP
1536:b3HdiLZIs1nwNvFGhfnu5e678dOGZiacNdIlqUcybEdf0bgtIY8+Qbh4v765qZpY:b30LZI0nkdGAIMhlNdIQUcy+f0bgtp8j
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\QQ2012.url" laass.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\QQ2012.url" rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4200 laass.exe -
Loads dropped DLL 2 IoCs
pid Process 4200 laass.exe 4268 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" laass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Progra~1\%Program Files%\~ d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\QQ2012.url d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe File opened for modification C:\Progra~1\%Program Files%\QQ2012.url d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe File opened for modification \??\c:\Program Files\%Program Files% d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\laass.exe d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\363.VBS d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe File created C:\Progra~1\%Program Files%\Cest.bat d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\best.bat d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe File created C:\windows\362.vbs d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe 4200 laass.exe 4200 laass.exe 4268 rundll32.exe 4268 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4268 rundll32.exe 4200 laass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4200 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 88 PID 1748 wrote to memory of 4200 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 88 PID 1748 wrote to memory of 4200 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 88 PID 1748 wrote to memory of 4268 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 89 PID 1748 wrote to memory of 4268 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 89 PID 1748 wrote to memory of 4268 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 89 PID 1748 wrote to memory of 1512 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 90 PID 1748 wrote to memory of 1512 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 90 PID 1748 wrote to memory of 1512 1748 d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0b8bfb08ed7f03e5467fa8bf9de3831_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files\%Program Files%\laass.exe"C:\Program Files\%Program Files%\laass.exe" QQ2012.url main2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4200
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" QQ2012.url main2⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\D0B8BF~1.EXE > nul & rd c:\%Progr~1 > nul2⤵
- System Location Discovery: System Language Discovery
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff
-
Filesize
88B
MD5a78667573d9a9ceb25a0d4e1a7a2db8b
SHA19a4a9cf44d39df2a24f86fc332cb3782eef8876d
SHA25649a93525279882890cb85cb794dfebd8fdc1f10fe0127d016ff1fc864a65167a
SHA51267276d58e5e98e5cfc1853a4b405390f8d9cad8171dc75b99878a8d5e7ddfbef7694fa5be5e50b733b0986301fef6a73171fef2c7b63d2473ba4a2dc105a5d18