Analysis
-
max time kernel
146s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 14:36
Behavioral task
behavioral1
Sample
d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe
-
Size
107KB
-
MD5
d494df1152d1411f473c423482d14a9f
-
SHA1
b3d1dd036a011038999c311445ebd7d75fed0c63
-
SHA256
1cedcf44e5a84003594d9d463f56663f8d49b330a3ee9de1d1580e66e3991d08
-
SHA512
86e15f5e280cd7365b6dd63044a2747d11e5c56df04af162035f9e07889b87810e2f80764d65b7e4d7e36ea6e0ccde1cc6798cabdc8e67f02ce1b4a1254ee1b4
-
SSDEEP
3072:yaUGwDRXvZgFGgU9MGBRasLehuWLs+8lRo+36XE8gC:y/xR/GFG9nLiuWLs/qU8gC
Malware Config
Extracted
systembc
91.243.82.99
-
dns
5.132.191.104
92.163.33.248
206.189.120.27
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ephd.exeephd.exepid process 1620 ephd.exe 4716 ephd.exe -
Processes:
resource yara_rule behavioral2/memory/1984-0-0x0000000000400000-0x0000000000447000-memory.dmp upx C:\ProgramData\eomxxmo\ephd.exe upx -
Drops file in Windows directory 2 IoCs
Processes:
d494df1152d1411f473c423482d14a9f_JaffaCakes118.exedescription ioc process File created C:\Windows\Tasks\corolina17.job d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\corolina17.job d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ephd.exed494df1152d1411f473c423482d14a9f_JaffaCakes118.exeephd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ephd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ephd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d494df1152d1411f473c423482d14a9f_JaffaCakes118.exepid process 1984 d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe 1984 d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d494df1152d1411f473c423482d14a9f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:81⤵PID:3040
-
C:\ProgramData\eomxxmo\ephd.exeC:\ProgramData\eomxxmo\ephd.exe start21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1620
-
C:\ProgramData\eomxxmo\ephd.exeC:\ProgramData\eomxxmo\ephd.exe start21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD5d494df1152d1411f473c423482d14a9f
SHA1b3d1dd036a011038999c311445ebd7d75fed0c63
SHA2561cedcf44e5a84003594d9d463f56663f8d49b330a3ee9de1d1580e66e3991d08
SHA51286e15f5e280cd7365b6dd63044a2747d11e5c56df04af162035f9e07889b87810e2f80764d65b7e4d7e36ea6e0ccde1cc6798cabdc8e67f02ce1b4a1254ee1b4