Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe
-
Size
101KB
-
MD5
d9c55d4746c8b350f41038560615fa15
-
SHA1
a6ab83c98cfbbfec9ebf7835e9e09cd348374069
-
SHA256
e692f3e75aec466d3c1cee060d522b44d3bc993f6d8e93e8467816ab8a883534
-
SHA512
4b50eb4c6c99e19526efbc08fa2ae7112bbea0a17a5311b8fa6a903324cc969a2191e8773b99f52edfa2651033034d780490999f04221fe25918886a625ae953
-
SSDEEP
3072:5bW2WEs0ObbbXlwY62BMR0KkksaCQgjvTk+:NQ0PYG0KTsaCQgjo
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fdsghk\Parameters\ServiceDll = "C:\\Windows\\system32\\hgfhk.dll" rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 notepad.exe -
Loads dropped DLL 4 IoCs
pid Process 2900 d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe 2900 d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe 2520 rundll32.exe 1704 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hgfhk.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\hgfhk.dll rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\notepad.exe d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\notepad.exe d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2100 notepad.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2100 2900 d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2100 2900 d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2100 2900 d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2100 2900 d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2520 2100 notepad.exe 31 PID 2100 wrote to memory of 2520 2100 notepad.exe 31 PID 2100 wrote to memory of 2520 2100 notepad.exe 31 PID 2100 wrote to memory of 2520 2100 notepad.exe 31 PID 2100 wrote to memory of 2520 2100 notepad.exe 31 PID 2100 wrote to memory of 2520 2100 notepad.exe 31 PID 2100 wrote to memory of 2520 2100 notepad.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Common Files\notepad.exe"C:\Program Files (x86)\Common Files\notepad.exe" C:\Users\Admin\AppData\Local\Temp\d9c55d4746c8b350f41038560615fa15_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\BFD6.tmp" "8A'+ [=[SCMR'8[='U"3⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2520
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5444c3a372551d2adc2f26c49f20621e4
SHA1d63ab0b360ba7a965af0e1b19929c741b34bb8ca
SHA25696bbf22f00532016dfe962d427905fd0a644e04b6be22655d98ae9893d857e8c
SHA512996f5cd4eeca41cc1a5e9afe62971f7d99f3068e560ad9567fc26bf76f606db0b037729c2f459c769869592f6b8696bdb2081f37cb6bf8ca4ab719f62ecbc950
-
Filesize
101KB
MD5d9c55d4746c8b350f41038560615fa15
SHA1a6ab83c98cfbbfec9ebf7835e9e09cd348374069
SHA256e692f3e75aec466d3c1cee060d522b44d3bc993f6d8e93e8467816ab8a883534
SHA5124b50eb4c6c99e19526efbc08fa2ae7112bbea0a17a5311b8fa6a903324cc969a2191e8773b99f52edfa2651033034d780490999f04221fe25918886a625ae953