Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe
-
Size
15KB
-
MD5
d1ac4071d870ccaa573a59581b215cef
-
SHA1
fa0b0dd20850dc596559cdee4943ca05f95b8609
-
SHA256
a4bf8f557dde1577fdc9f45ec6490525fedfde75ec3318e9398e221fab00adad
-
SHA512
d57a68fae0175a96fc2101f986bc6f09335f18312755a627a962ff153ba6f9b3d73863262f46815b0dbe70e0f865ee247610fd01840706c8b938902d731327c6
-
SSDEEP
384:bjxPJFhd3o6dm1w/v3qNrciy6kpvLN4YiIYdeyt7lL3Ht84B:phFTo6P/f556ghXyt5L3X
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\nwapi32dj.dll = "{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}" d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\nwapi32dj.tmp d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nwapi32dj.tmp d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nwapi32dj.nls d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ = "C:\\Windows\\SysWow64\\nwapi32dj.dll" d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ThreadingModel = "Apartment" d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9} d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3392 wrote to memory of 4912 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 94 PID 3392 wrote to memory of 4912 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 94 PID 3392 wrote to memory of 4912 3392 d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1ac4071d870ccaa573a59581b215cef_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F7FC.tmp.bat2⤵
- System Location Discovery: System Language Discovery
PID:4912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD55d4d605b28bde681fba05d4f3db23c69
SHA111ec3df7cb6a7e4e7fa14eeb08c72ad9ea217049
SHA256d6674244b208e598d8c5014b439ea407fd2b23a8d8aee65217cee4c3379b7555
SHA512f9a92efb3c275a599367cd6887129fcf475a365b70df6a945c3202ad03f7d8530a03a472ffc3fe05d72a3a1d1a7d34527c40405554093cfbab0255c07773daef
-
Filesize
428B
MD58a0cdcc50012ef4838142a07b7264322
SHA1e5a68e996d5640228869a43ab17e95f222ba8444
SHA2564cb7fea0e70faf0502c006057b5b5ece0ac3192b787939dbbd2837855fc8a5be
SHA5120a3e099a69edf19ad0a265c64fd8dd6904d7e0b667f8c6c448e7f3f09f251133eacdcd7812abe4e6550f154c9eebb96a29351a630d2fbf88d6432e59fa83aa58
-
Filesize
2.2MB
MD5b160af287401384a4cb1a4961e54c342
SHA11a4ebb7a6a65b1f24c9b04ed7726e0e9ab1d6cf2
SHA256207ce6b604c46c74f1ca150e040e9ddbff25a59af73a8d33f15c8fca68de50d8
SHA512fe449179da34c9a5a4a9ff5e4470680c11852a377ec73af911b36bb6b50cbcb3df5f26910d5289bdf29849268f01213d6978a4a284daae34fc8ab409a9e33e63