Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe
-
Size
92KB
-
MD5
e177d13f60597842675cdafae584ce0a
-
SHA1
1227f74d20fb57a80a16eb3cb091b5c1cc28953d
-
SHA256
9028456204e1131088f1593fc5222c9fd07afd1ea0810b9e0789b57394255985
-
SHA512
b02b88f563b4a03d28b46827622a309b04b3f6e494ba7e0019b5c3359ac52a88d5629552393774308d3ce52acfbe2a8d8e8eaa2b828a708e4e847bbf31121e1f
-
SSDEEP
1536:RBga+MWNcCNR9g5xZCk3r9HdE14CzhFdlmy3xEPwEZTlfknK+W/iEM2:Ma94/NR9g5xZCk9Hd69lh3Rulcn+/iEM
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3100 rundll32.exe 1400 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lqecedabexo = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\DExedmf.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe 3100 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3100 1356 e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe 86 PID 1356 wrote to memory of 3100 1356 e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe 86 PID 1356 wrote to memory of 3100 1356 e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe 86 PID 3100 wrote to memory of 1400 3100 rundll32.exe 95 PID 3100 wrote to memory of 1400 3100 rundll32.exe 95 PID 3100 wrote to memory of 1400 3100 rundll32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e177d13f60597842675cdafae584ce0a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\DExedmf.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\DExedmf.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD500cafbbc76f83b7ef10dfc39e59c3316
SHA1fd1a8efc3dfc6b23801197f5ba7038ff741f8a18
SHA25669436f41e8c562232d2e3c7c3312480b36969063a2fd4916fe0a83041297cd3a
SHA5128aee07bbcf32406fb8e41e80cfcc3d0a527e2ce878c2793466a24f027c055de5a82aab08ba13d4e743746fd32d9fd509561b19137b1ec7e1c614fdee251790a9