Analysis
-
max time kernel
94s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe
-
Size
458KB
-
MD5
e9cdcf4e370dd7cbb50f6ee66f2270a6
-
SHA1
1895936523ba23b7b9ca9e976bc1e111ddb3adb4
-
SHA256
998ad4aa8187efc0a982ba7bbae7bccf46c770a1e6332a655bb0660776bf43e2
-
SHA512
78379c6f9a1a436d07bb0fa925d020701be4df4d4afd87d52f873d8b67c249b2d17c9199bfd89172ce675ad145f775913611c5817503c7cb6b0c1fa5cd2fc29e
-
SSDEEP
6144:YEwxGxb1xzRG4oTmloj8AyYIuHI1mwat/4J5loTIz/ejrk5an360O80nf0i2O:YBcpfRMmm4AyYI/mwe/alToKw08i2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4528 svchost.exe 4148 dndvxy.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dndvxy.exe svchost.exe File opened for modification C:\Windows\SysWOW64\dndvxy.exe svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4900 set thread context of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dndvxy.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4900 wrote to memory of 4528 4900 e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe 82 PID 4528 wrote to memory of 4148 4528 svchost.exe 83 PID 4528 wrote to memory of 4148 4528 svchost.exe 83 PID 4528 wrote to memory of 4148 4528 svchost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9cdcf4e370dd7cbb50f6ee66f2270a6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\dndvxy.exeC:\Windows\system32\dndvxy.exe 1036 "C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD52b9482eb5d3af71029277e18f6c656c0
SHA1d594dc39c6e5f8fbd145d8970e096dc1d9b4a7f1
SHA2561be7a63415f03400065f2beb2ca991c8b0b914bd41310cf9dd93c5e1fc0ed072
SHA51246abaf2e57e498dd60352f76b484825eff7ebdd89cf512ba046d229d5d24a34e5f67c48a1d59551e0b49603a1ffee2ffbc124eef0042ddf3fe7fae423b4af0a8