Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe
-
Size
607KB
-
MD5
ddab2bca62bc4c00e27ef88680e9bb1a
-
SHA1
26fde09c1dc662746d975b8402acc906a40fb83d
-
SHA256
834b234322650d807ee0d2732fed03d13909c530cf2acad50f4923df51fa6a6d
-
SHA512
4b7c42ce80e173872d1ff1d90ff1d6394bb9760ee22f99082d36d73adc6ae4e09363e7413ff84083492b41d60e161509b88420661dcbf89c680b3820710d47a5
-
SSDEEP
12288:cMm4XMFMvwmb1TLtPSkBtHpuMBDmMONaxnPQbLl3OvLrZCqgeXZeuIdb4E:cbFFWwmb1/1SkBieDmGnPel3Srk+AulE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2632 dllhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2872 cmd.exe 2872 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2632 dllhost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2732 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2732 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2732 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2732 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2872 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 32 PID 2160 wrote to memory of 2872 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 32 PID 2160 wrote to memory of 2872 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 32 PID 2160 wrote to memory of 2872 2160 ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe 32 PID 2872 wrote to memory of 2632 2872 cmd.exe 34 PID 2872 wrote to memory of 2632 2872 cmd.exe 34 PID 2872 wrote to memory of 2632 2872 cmd.exe 34 PID 2872 wrote to memory of 2632 2872 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddab2bca62bc4c00e27ef88680e9bb1a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Temp\UMI΢¹·Ó²¸´Öƹ¤¾ß.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Temp\dllhost.exe.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\Temp\dllhost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5c6f36cbb576ec17ca084e68360d86e7f
SHA10737bfda6b7df0544e91c5c2bc25c2854d854952
SHA256f6e177fe2905e461b0108b29df120fe7010b29afbd5040c5622bf66e4b306ead
SHA51286ff4ba090b9154a16183d91c65833c2f6feaef7ee3947dfd37c588dafb65895350302b6d4fbdd410baaa0c02c297ed3e6da64dae357334f99ed3dcd269439ed
-
Filesize
172B
MD50fab8ac2fcc8ba2e869a39c995945494
SHA146778e906e3e1e6435c3fd22aa3f0461751327fa
SHA2565f615580fd84e992e822d4425a19b3a79e8507c7697951d9c5b53602a6d2a622
SHA5127a5e822d1c57e431753e73bcec98b042a0f99993c7f38d0558d006d1563a2925d0c85d238df052221f9da88027d369d78df93ff07bce444d120c0002c602db46
-
Filesize
20KB
MD5f02cee4204ade52751233a349562cdee
SHA18f32aed10a031527b0010b05b12bd0b323e4493b
SHA256c212d7109486ee72085daa98202f1f95704443292c4334596c69941c6a340185
SHA5128d2ab31f898e60b4bf6a2013c3220d929e8b092814d370391f4a419e511ea1d788ca4cf99c7d389e39f7c546178f8c42d6ce0ccb0f769e08cd9c747ac00df23a