Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 08:55
Behavioral task
behavioral1
Sample
dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe
-
Size
26KB
-
MD5
dfdbcbdd054736fa3d1ae3e3905ffdee
-
SHA1
5be33ba6388bd2b5e853c359e630945438058ff0
-
SHA256
92e6ddaef9a33fa99464c0bfc6a62fba4a7671285f40999f20de6999bd2232bc
-
SHA512
14eccf86ce39ab3b66d48833305bb1d9eae623a583cbf868da84a0d111d7bb9f23ac1f2ad317b715df39862994924260cbd1df72a89323f4aaae62d9a7ac9d66
-
SSDEEP
768:txIMLVLKBrEh5q9Iz/CEs5K0nbcuyD7UikR:tioLK45q+G5K0nouy8ikR
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4404-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4404-20-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\1006.ocx dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\elementclientgj01.ocx dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe File created C:\Windows\SysWOW64\elementclientgj01.ocx dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\system.ini dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe File created C:\Windows\SysWOW64\New.dll dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\New.dll dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1006.ocx dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4404 dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe 4404 dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 344 4404 dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe 88 PID 4404 wrote to memory of 344 4404 dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe 88 PID 4404 wrote to memory of 344 4404 dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfdbcbdd054736fa3d1ae3e3905ffdee_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\elementclientgj01.bat2⤵
- System Location Discovery: System Language Discovery
PID:344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024B
MD5b5c194cad917eab204292824039d8369
SHA1ab120081f411494e607a10ebdd3c738e1506c97d
SHA256661f7b2ff40286acef065c89f884b738373f871710ef86675509afdb17d465aa
SHA5120703a1914bab339391fbd16acb21bd59445fe7aa0c110bfa02c5cbb1686cd2ff24a15dc9b50c57fcab440fc4db3ad01fd12e510bb02d9aee342bccee2fee40ce