Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
dbc365af2c8790837017107c07628921_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbc365af2c8790837017107c07628921_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbc365af2c8790837017107c07628921_JaffaCakes118.exe
-
Size
34KB
-
MD5
dbc365af2c8790837017107c07628921
-
SHA1
f0e69844201f25bdb906dd3008c5a1729aaa8edf
-
SHA256
7a3a7d180b0f7a70670108e7a57afa09ef2225fb5a657204e2532142031d130e
-
SHA512
df3aff5b88a306e778d6e63e3f31c80f24daebacd8dfb43bd2d479eeaf61a69dfa7908dc8b7a78c023174dde25da321adb31013b24c958566a8edc549316c9b7
-
SSDEEP
768:buuuuuuuuwJ0RSYFngKlAYNRVcZ/4vTwRJrmmaJUBbCEn1VbBoQrmIDd:E2LpgKlAuEZiYimaSBbCE1VbBoQrH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1320 explorer.exe -
Unexpected DNS network traffic destination 34 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.115.53 Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.112.95 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.115.53 Destination IP 85.255.112.95 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.112.95 Destination IP 85.255.112.95 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.115.53 Destination IP 85.255.112.95 Destination IP 85.255.115.53 Destination IP 85.255.112.95 Destination IP 85.255.112.95 -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kernel32.exe dbc365af2c8790837017107c07628921_JaffaCakes118.exe File created C:\Windows\SysWOW64\bmunj.exe dbc365af2c8790837017107c07628921_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bmunj.exe dbc365af2c8790837017107c07628921_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe iexplore.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5016 set thread context of 3188 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 93 PID 5016 set thread context of 1320 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbc365af2c8790837017107c07628921_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
pid Process 2616 ipconfig.exe 4876 ipconfig.exe 1172 ipconfig.exe 4248 ipconfig.exe 4908 ipconfig.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3188 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 93 PID 5016 wrote to memory of 3188 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 93 PID 5016 wrote to memory of 3188 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 93 PID 5016 wrote to memory of 3188 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 93 PID 5016 wrote to memory of 1320 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 94 PID 5016 wrote to memory of 1320 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 94 PID 5016 wrote to memory of 1320 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 94 PID 5016 wrote to memory of 1320 5016 dbc365af2c8790837017107c07628921_JaffaCakes118.exe 94 PID 3188 wrote to memory of 4876 3188 iexplore.exe 95 PID 3188 wrote to memory of 4876 3188 iexplore.exe 95 PID 3188 wrote to memory of 4876 3188 iexplore.exe 95 PID 3188 wrote to memory of 1172 3188 iexplore.exe 97 PID 3188 wrote to memory of 1172 3188 iexplore.exe 97 PID 3188 wrote to memory of 1172 3188 iexplore.exe 97 PID 3188 wrote to memory of 4248 3188 iexplore.exe 99 PID 3188 wrote to memory of 4248 3188 iexplore.exe 99 PID 3188 wrote to memory of 4248 3188 iexplore.exe 99 PID 3188 wrote to memory of 4908 3188 iexplore.exe 100 PID 3188 wrote to memory of 4908 3188 iexplore.exe 100 PID 3188 wrote to memory of 4908 3188 iexplore.exe 100 PID 3188 wrote to memory of 2616 3188 iexplore.exe 103 PID 3188 wrote to memory of 2616 3188 iexplore.exe 103 PID 3188 wrote to memory of 2616 3188 iexplore.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbc365af2c8790837017107c07628921_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbc365af2c8790837017107c07628921_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /flushdns3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4876
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /registerdns3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1172
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /dnsflush3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4248
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /renew3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4908
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /renew_all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2616
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1320
-