Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe
-
Size
367KB
-
MD5
da739c01185eaa4d40fc599072be2838
-
SHA1
d078b34087e0ecf58fbf3a387bc640f32da70f6e
-
SHA256
dfdc52813a2f6c9fed17b860dbf9445e4eced30fe1ed4040da1357861cdca5c0
-
SHA512
5b193c58c2fd013782de20dcccaa56c45dc9a1ebedb5219f0c8ce07159614ceb97e871730871f97e296e81accf1f17add6d47aeb9bf0df9e0a572e711a116084
-
SSDEEP
6144:gW5GsMki3/cRuIimctDLsy2PY6OGi17zjUvmxpEt7ncWdCkAbKPmSRoSNJa:V5Gse/cRQtDYnPY9GGzUvmGV4kOVGoSW
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\beep.sys da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1936 shvlzmdll.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 1928 1936 shvlzmdll.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 948 1928 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shvlzmdll.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe 4536 da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1928 1936 shvlzmdll.exe 88 PID 1936 wrote to memory of 1928 1936 shvlzmdll.exe 88 PID 1936 wrote to memory of 1928 1936 shvlzmdll.exe 88 PID 1936 wrote to memory of 1928 1936 shvlzmdll.exe 88 PID 1936 wrote to memory of 1928 1936 shvlzmdll.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
C:\Program Files (x86)\MSN Gaming Zone\Windows\shvlzmdll.exe"C:\Program Files (x86)\MSN Gaming Zone\Windows\shvlzmdll.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe" 595512⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 123⤵
- Program crash
PID:948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1928 -ip 19281⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD5da739c01185eaa4d40fc599072be2838
SHA1d078b34087e0ecf58fbf3a387bc640f32da70f6e
SHA256dfdc52813a2f6c9fed17b860dbf9445e4eced30fe1ed4040da1357861cdca5c0
SHA5125b193c58c2fd013782de20dcccaa56c45dc9a1ebedb5219f0c8ce07159614ceb97e871730871f97e296e81accf1f17add6d47aeb9bf0df9e0a572e711a116084