Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
eac3188db1de49c9b748084279796284_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac3188db1de49c9b748084279796284_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac3188db1de49c9b748084279796284_JaffaCakes118.exe
-
Size
14KB
-
MD5
eac3188db1de49c9b748084279796284
-
SHA1
f694b0f87c5e6dc435678f14ca1ba50da93f2928
-
SHA256
06bd318cc01755391848668d46140261703fe965699f34dd48fcb85049dd8183
-
SHA512
df36a6f81fa8bb4a8e522ab64b1fc6f606e6d6b357ff089917d06ced7650a60c46c3af43a62b35990e0f928f28ba78c2ef78a9379e717a16f3e9496bfda1491b
-
SSDEEP
384:tczoYdP1jtpypbtB0celpCWDaiBy49vwpPpQ6L0WIc9Qe:OMI1jtMZcl4WDFyqwxS6L79
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\cslkodje.dll = "{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}" eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cslkodje.tmp eac3188db1de49c9b748084279796284_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cslkodje.tmp eac3188db1de49c9b748084279796284_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cslkodje.nls eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac3188db1de49c9b748084279796284_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ThreadingModel = "Apartment" eac3188db1de49c9b748084279796284_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9} eac3188db1de49c9b748084279796284_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32 eac3188db1de49c9b748084279796284_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ = "C:\\Windows\\SysWow64\\cslkodje.dll" eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3248 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 90 PID 1780 wrote to memory of 3248 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 90 PID 1780 wrote to memory of 3248 1780 eac3188db1de49c9b748084279796284_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac3188db1de49c9b748084279796284_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac3188db1de49c9b748084279796284_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F9E1.tmp.bat2⤵
- System Location Discovery: System Language Discovery
PID:3248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5ca815fdae03d31dfaf7b36b4d619c92e
SHA12a1a78d5feae5b28598878fae1aef67d987d233b
SHA2561bdfd4ac43384a0e45e87f70680b5d14a8d7b01d362ea40ab98b4ceeaf4e8410
SHA512f676d0eb70a805eec4eba1602252f0cd2cd0353facbf14abe37d70ad190ff3cf11e05b8faf505176d72267851638782b5a6c2e1b7332f0d41ac3c8319ea7d918
-
Filesize
428B
MD5e59c68d7ddcda526765a879e63228e1e
SHA16d26b4ef1f31858e7f1332bb20c2c49d0472ede6
SHA256135b283bdb69aed077557005e816d8b8eeaece4323f4093a76f4eb2d55be1b94
SHA5124ddcbd27da1d5778f1558efc834fd7cc8a1aec7257c40ca3f0c2092a65563906ff85078ed9d7c68c5386d18e6f273ea0345a7e55cac8fcf447684d5b8e43d7b1
-
Filesize
2.1MB
MD5853471f4e392dd51b98c6d7d57ce0672
SHA1cc246cb314b1fb80e06afd27d37faa27afe1f7f7
SHA256c1ab79c28f47bbb30c5a55b421b241d0acbcb5edaa7993d6f7f0d6fbd7019b9c
SHA5128210730cc52282634fd356163c3d2cb30acbb090a5974f68e6e212c6578ceaf98ff023a65a92e6c1ceaab5e217a5235c23ab3ba593c969f711c36db4ea0d54b5