Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 05:08
Behavioral task
behavioral1
Sample
dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe
-
Size
11KB
-
MD5
dbde69c8d7306fdf1f26b08a7e1a631a
-
SHA1
3edcfc6330b324b6471e20f51e69c1ac821ffc30
-
SHA256
f7a84a2593df03534f2d096c75509528ff1927157dc02e456f086d7459b4ee39
-
SHA512
267b11db4312300f53ba0024e2a3dccf4c8e2343cb3b1e060bfdfd8dfcd325d270caad7e335c7ca368703e811a3233c91faf72d1990ab54867595bce6842a329
-
SSDEEP
192:ANfmSO1JM6+wWtIlJHyFh7L+S2dlJx9CiL99P/lj2hsFlDdCNcVg:EmSO1JM6+wWyjS37CxFHC699B2odCSg
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2200 johandyk.exe -
resource yara_rule behavioral2/memory/4824-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x000700000002342d-4.dat upx behavioral2/memory/4824-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2200-8-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2200-17-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\johandy.dll dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe File created C:\Windows\SysWOW64\johandyk.exe dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\johandyk.exe dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language johandyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2200 4824 dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe 83 PID 4824 wrote to memory of 2200 4824 dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe 83 PID 4824 wrote to memory of 2200 4824 dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe 83 PID 4824 wrote to memory of 2168 4824 dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe 96 PID 4824 wrote to memory of 2168 4824 dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe 96 PID 4824 wrote to memory of 2168 4824 dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\johandyk.exeC:\Windows\system32\johandyk.exe ˜‰2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\dbde69c8d7306fdf1f26b08a7e1a631a_JaffaCakes118.exe.bat2⤵
- System Location Discovery: System Language Discovery
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD56fb41e3f93b4b4e605677d3baa2f40cb
SHA1256b879a4000b59557518df644d6c19bf69bdaaf
SHA2560495443fcdfde0bea0877db019ccc3e49aebf27966863e703e646c3b306d9640
SHA5120caed7c90b688dbf909b83602f0292669d0a4dd5b1f35febce23f047ab9d57d2a30af979525e49cdab2cf9535f25f7f668531b437b5c5ee45a3cc815b6079e2a
-
Filesize
11KB
MD5dbde69c8d7306fdf1f26b08a7e1a631a
SHA13edcfc6330b324b6471e20f51e69c1ac821ffc30
SHA256f7a84a2593df03534f2d096c75509528ff1927157dc02e456f086d7459b4ee39
SHA512267b11db4312300f53ba0024e2a3dccf4c8e2343cb3b1e060bfdfd8dfcd325d270caad7e335c7ca368703e811a3233c91faf72d1990ab54867595bce6842a329