Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe
-
Size
15KB
-
MD5
d1ac4071d870ccaa573a59581b215cef
-
SHA1
fa0b0dd20850dc596559cdee4943ca05f95b8609
-
SHA256
a4bf8f557dde1577fdc9f45ec6490525fedfde75ec3318e9398e221fab00adad
-
SHA512
d57a68fae0175a96fc2101f986bc6f09335f18312755a627a962ff153ba6f9b3d73863262f46815b0dbe70e0f865ee247610fd01840706c8b938902d731327c6
-
SSDEEP
384:bjxPJFhd3o6dm1w/v3qNrciy6kpvLN4YiIYdeyt7lL3Ht84B:phFTo6P/f556ghXyt5L3X
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\nwapi32dj.dll = "{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}" d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1540 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\nwapi32dj.tmp d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nwapi32dj.tmp d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nwapi32dj.nls d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ = "C:\\Windows\\SysWow64\\nwapi32dj.dll" d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ThreadingModel = "Apartment" d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9} d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1540 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1540 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1540 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 30 PID 2400 wrote to memory of 1540 2400 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\13EE.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD55d4d605b28bde681fba05d4f3db23c69
SHA111ec3df7cb6a7e4e7fa14eeb08c72ad9ea217049
SHA256d6674244b208e598d8c5014b439ea407fd2b23a8d8aee65217cee4c3379b7555
SHA512f9a92efb3c275a599367cd6887129fcf475a365b70df6a945c3202ad03f7d8530a03a472ffc3fe05d72a3a1d1a7d34527c40405554093cfbab0255c07773daef
-
Filesize
428B
MD58a0cdcc50012ef4838142a07b7264322
SHA1e5a68e996d5640228869a43ab17e95f222ba8444
SHA2564cb7fea0e70faf0502c006057b5b5ece0ac3192b787939dbbd2837855fc8a5be
SHA5120a3e099a69edf19ad0a265c64fd8dd6904d7e0b667f8c6c448e7f3f09f251133eacdcd7812abe4e6550f154c9eebb96a29351a630d2fbf88d6432e59fa83aa58
-
Filesize
2.2MB
MD5921fe693d1cb6b26061dd5d2ab72a562
SHA1c8d0db1b566884064813e0d5056b568095edafb3
SHA256daf72b6c0c1ec13444d0fa12c0d334b81d00487db64803302d699420656b356b
SHA51216a63a938e7a533672a5a5b170724a4060da07e5e3275b98c7e1c23db34cb7acdb1f79631fcfd0e5638de2d279cdadabb629df6a6d8a269ec8fbf11818d4b1c8