Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 23:07
Behavioral task
behavioral1
Sample
db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe
-
Size
32KB
-
MD5
db6363ea2b3d2de121a8eb26578fcf66
-
SHA1
62882f40f78706630bd5f96c51e1f43e96be1fee
-
SHA256
7c493c7ab436958e109b9dfcd169e0893b08b61067693f351c159b4ea7db98f2
-
SHA512
b53cd90b9af69f5aff39268091d4f9d2289e75575128e9e2d61795e85036547f2aa3fca7c24eca3c914ea76b0e9da6ff62c11692569a72049e470923c4adaa35
-
SSDEEP
768:K3HMAHUSkgn95wGXhl2zNblNVb+rO7+XW9fSO1i5CSzn+XQp3Y:dM/n95flg53VsXW9v9PQp3Y
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 5012 db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe 5012 db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/5012-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x00080000000234cb-7.dat upx behavioral2/memory/5012-15-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-17-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-18-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-20-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-22-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-24-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-26-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-28-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-30-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-32-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-34-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-36-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-38-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-40-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/5012-42-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\11EFC04C.dll db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\11EFC04C.dll db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\11EFC04C.dat db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\11EFC04C.dat db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Help\11EFC04C.chm db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe File opened for modification C:\Windows\Help\11EFC04C.chm db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5012 db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db6363ea2b3d2de121a8eb26578fcf66_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5db6363ea2b3d2de121a8eb26578fcf66
SHA162882f40f78706630bd5f96c51e1f43e96be1fee
SHA2567c493c7ab436958e109b9dfcd169e0893b08b61067693f351c159b4ea7db98f2
SHA512b53cd90b9af69f5aff39268091d4f9d2289e75575128e9e2d61795e85036547f2aa3fca7c24eca3c914ea76b0e9da6ff62c11692569a72049e470923c4adaa35
-
Filesize
45KB
MD5d2b072b87378bced6c3fdbe6c0c2cde4
SHA19b0bbe47f1c3aa70ecb6b828fb68f4910a2756f1
SHA2566b0b4d40ec372aeba81a019a17c01911fab1c5ecc7ad8f01fbbbc54da5411dd2
SHA5124ff6ba593f5c945c274a7815942ee8a5ad042b05b850638b27858d2ab5cee124a9302cba8914026befa2f773f91a7d5daad0d6562e101b9c8ab93af0c8ffb86f