Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe
-
Size
324KB
-
MD5
eaa5fc2cdf6a9122cc2e50c0c93bec53
-
SHA1
234b179e72b52dd185ee4adb322d9f780a0acdc2
-
SHA256
4156aef158422389226ea6620d582dc9d51917f2db0bbcff55556c4863fff6da
-
SHA512
b8b6eea5a45107b350f1e59ea2de3c907c3d87f800922e811e113662392b1df1ad6e8cd07ec555deed6fce713f6b1f5e71bda19b9fc2548e6e1a4868a9498963
-
SSDEEP
6144:XbQNeLV+DDBsqr3swvjk6h+8UqXnOtusL6PqdtqIRu4s:Xc0Z8DMAQ4n5e7HqIw
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4836 gncbdg.exe 2544 gncbdg.exe 2496 hcbsmw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2516 set thread context of 4312 2516 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 82 PID 4836 set thread context of 2544 4836 gncbdg.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gncbdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hcbsmw.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2544 gncbdg.exe 2544 gncbdg.exe 2544 gncbdg.exe 2544 gncbdg.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4312 2516 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 82 PID 2516 wrote to memory of 4312 2516 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 82 PID 2516 wrote to memory of 4312 2516 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 82 PID 2516 wrote to memory of 4312 2516 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 82 PID 2516 wrote to memory of 4312 2516 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 82 PID 4312 wrote to memory of 4836 4312 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 83 PID 4312 wrote to memory of 4836 4312 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 83 PID 4312 wrote to memory of 4836 4312 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 83 PID 4836 wrote to memory of 2544 4836 gncbdg.exe 84 PID 4836 wrote to memory of 2544 4836 gncbdg.exe 84 PID 4836 wrote to memory of 2544 4836 gncbdg.exe 84 PID 4836 wrote to memory of 2544 4836 gncbdg.exe 84 PID 4836 wrote to memory of 2544 4836 gncbdg.exe 84 PID 4312 wrote to memory of 2496 4312 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 85 PID 4312 wrote to memory of 2496 4312 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 85 PID 4312 wrote to memory of 2496 4312 eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe 85 PID 2544 wrote to memory of 3460 2544 gncbdg.exe 55 PID 2496 wrote to memory of 4880 2496 hcbsmw.exe 86 PID 2496 wrote to memory of 4880 2496 hcbsmw.exe 86 PID 2544 wrote to memory of 3460 2544 gncbdg.exe 55 PID 2544 wrote to memory of 3460 2544 gncbdg.exe 55 PID 2544 wrote to memory of 3460 2544 gncbdg.exe 55 PID 2544 wrote to memory of 3460 2544 gncbdg.exe 55 PID 2544 wrote to memory of 3460 2544 gncbdg.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eaa5fc2cdf6a9122cc2e50c0c93bec53_JaffaCakes118.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hcbsmw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hcbsmw.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:4880
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD52a8b8f438aa34414cb85f8a1631f5188
SHA1275210680630c0e2c0dcdc2ba1a83a5af3cb0fbd
SHA25680e6e1c874832caff48017c5513a8f7e3a65b1dfac76fe22cca6c2e91dbb9b76
SHA512d51a1ca86bbb583acda1c49954363221c0ff1ec54d26b1c6b63fd74372153e4a8ff0249e206b0f477602d26b6fed86e2fd635d29e441d0c913faba822df358ae
-
Filesize
133KB
MD5c68cb7cfc28a8da48b445ba450f230ec
SHA1b6a02cb4b57e994b8fc7e7712e089a8886e609a2
SHA2563e043850157d2dc33eb178ee60222ea093bb3fb042c823f649ee2fc56c0923c9
SHA512d8477d441c4bf88671169c1bd44e268817819c8c90caefd0ecd21e4d384ed5d0880fc9abb3b708e4e5e5596c2b920ee11355973920ff6e3ba783311c5e88f95f