Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe
-
Size
307KB
-
MD5
d28fe996d3f2aed7309512422bfedc20
-
SHA1
a278b27bc13d9f9f8cc3c7dd847d3c2042bb0756
-
SHA256
a99627df830ef9e4119eda79cdc9f379785f3651007e927f79d50a0e50401284
-
SHA512
4ebbc5ba15ad7bea82cae5bb000d5ea414144e0b60a8460b18ba5b7353412f0ebb677818a1e055b51dbb2a5f2af1578dbe3a09611f17f069ec240ace4a8e570b
-
SSDEEP
6144:2qzUT72Y0SdzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOVPECYeixlYGickz:2CI7SSUYsY1UMqMZJYSN7wbstOV8fveh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1516 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2500 luluda.exe -
Loads dropped DLL 1 IoCs
pid Process 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D9E5F948-3C80-AD4F-E7F9-6BD2C10548CF} = "C:\\Users\\Admin\\AppData\\Roaming\\Lofa\\luluda.exe" luluda.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1848 set thread context of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luluda.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Privacy d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe 2500 luluda.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2500 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2500 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2500 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 30 PID 1848 wrote to memory of 2500 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 30 PID 2500 wrote to memory of 1100 2500 luluda.exe 19 PID 2500 wrote to memory of 1100 2500 luluda.exe 19 PID 2500 wrote to memory of 1100 2500 luluda.exe 19 PID 2500 wrote to memory of 1100 2500 luluda.exe 19 PID 2500 wrote to memory of 1100 2500 luluda.exe 19 PID 2500 wrote to memory of 1172 2500 luluda.exe 20 PID 2500 wrote to memory of 1172 2500 luluda.exe 20 PID 2500 wrote to memory of 1172 2500 luluda.exe 20 PID 2500 wrote to memory of 1172 2500 luluda.exe 20 PID 2500 wrote to memory of 1172 2500 luluda.exe 20 PID 2500 wrote to memory of 1224 2500 luluda.exe 21 PID 2500 wrote to memory of 1224 2500 luluda.exe 21 PID 2500 wrote to memory of 1224 2500 luluda.exe 21 PID 2500 wrote to memory of 1224 2500 luluda.exe 21 PID 2500 wrote to memory of 1224 2500 luluda.exe 21 PID 2500 wrote to memory of 328 2500 luluda.exe 25 PID 2500 wrote to memory of 328 2500 luluda.exe 25 PID 2500 wrote to memory of 328 2500 luluda.exe 25 PID 2500 wrote to memory of 328 2500 luluda.exe 25 PID 2500 wrote to memory of 328 2500 luluda.exe 25 PID 2500 wrote to memory of 1848 2500 luluda.exe 29 PID 2500 wrote to memory of 1848 2500 luluda.exe 29 PID 2500 wrote to memory of 1848 2500 luluda.exe 29 PID 2500 wrote to memory of 1848 2500 luluda.exe 29 PID 2500 wrote to memory of 1848 2500 luluda.exe 29 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 1848 wrote to memory of 1516 1848 d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe 31 PID 2500 wrote to memory of 1572 2500 luluda.exe 34 PID 2500 wrote to memory of 1572 2500 luluda.exe 34 PID 2500 wrote to memory of 1572 2500 luluda.exe 34 PID 2500 wrote to memory of 1572 2500 luluda.exe 34 PID 2500 wrote to memory of 1572 2500 luluda.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d28fe996d3f2aed7309512422bfedc20_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\Lofa\luluda.exe"C:\Users\Admin\AppData\Roaming\Lofa\luluda.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8ccbd040.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1516
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:328
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD58965943c1c4fd25d06bba9e0e607f2be
SHA1c78709882dc893e9f14da3abf9b3435a3dd2932e
SHA2561bc56482b1f431efadecef6dbf83112559ccc4523b7d48faca0bcf44464636ce
SHA512f5fd5dc5cdbe169369f1fa5d61fca7d3dc474b37078b5bc004644aa8509dffd7bf0a3edec159fd5f0eb6646e2dfa9c79fb6bf29b1d0df35ba3cf59f1b4006e80
-
Filesize
307KB
MD56d92781ffeafa395b333eb798bebcd6c
SHA1687d6b83343955fdc448e45c1f30b7df4e38e615
SHA256445e303eb92e1f3037d22b9ad85231f6c942bba58aae7d2ef4260e629e056c76
SHA512f04d2f5244b138b443bd260b99155d6b656826ca42a92e6af4e8c0d8683d97afc46773edf2e63c6548111b8e9e29c6d03f5e87492dcffa26d3788a1553f2d18f