Analysis
-
max time kernel
31s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe
-
Size
14KB
-
MD5
edf3ba994f97430c98579ba8d84d6de6
-
SHA1
ece97f49f75d25c8f561b949aecf4e62bc0b9e1b
-
SHA256
8dda499584399fb05ae017dcf093d7aa327039f10fb69fa3d54253b7b888209a
-
SHA512
8016c9be5ecb3f361e2bea11d95c2fb17b715ba52aaa05a5aeab5d00e41b7964923f2d0a3435ca0ad06f05d2498958539307e86e4736df8c3be59b0938d4d9c1
-
SSDEEP
384:FIAoI4N/TA6kjOVvZzbWuGFbyaW6bZwcsj51Y8fJWI6S:FBo5JTA9jOVxPOhsI8Fr
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\rxlsifdv.dll = "{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}" edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rxlsifdv.tmp edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rxlsifdv.tmp edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rxlsifdv.nls edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8} edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ = "C:\\Windows\\SysWow64\\rxlsifdv.dll" edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ThreadingModel = "Apartment" edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 2768 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe 29 PID 904 wrote to memory of 2768 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe 29 PID 904 wrote to memory of 2768 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe 29 PID 904 wrote to memory of 2768 904 edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edf3ba994f97430c98579ba8d84d6de6_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\6A5.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD530c6411cf2e3042953ee161a32fe1ad8
SHA1e69fc72cfdd7b28ca12614dbbe4e788a91d76f24
SHA2563bf9fc2309dc01acc1c19603f215f474f1ea959dc1d2d207977afe420ab77c50
SHA512e9de8788a2b6f0da3cbefa9f96243d7dbe2fb73e7693945a5cd254cb16d6a457d516973a7ba9e25d60edae0f2efe1db3c0fd59b59f0175b8592eb2cfc112a620
-
Filesize
428B
MD54ebaf0888aaf49df5ca7adf16b18ebeb
SHA1b28ba490dc67a1e2e1644fa3eec228695b0d4137
SHA2564d6f218236666ac36ac68c7e4f565a4e49d6ffc24812b53db8863297d2e273f6
SHA51265574bd0484d6b3fff0cc5accd5b3108fbf32b245d69e755867d6bffb6a8314db68aa3d2efafaa489c8285ab43b7dc32328d3425016c15b6d58b2a3c939ed344
-
Filesize
2.3MB
MD59ce695e4fe983046fbbc842832aafcbb
SHA151b7477b51eac63f8241982cf606a3ea689022ba
SHA25614b671754cad50af809a9a60f03ebe66bbb176ca71a7268fa7ac3b4f9f4d5f3c
SHA512d5f7432f19e1427e9f6a322aed50126f096264ad565bfb65e55030d8fd2c959651c7ac8f2d264be672cc69d4f5619f4bcd0a7e0ef5e1ffb0da0adba1460b9bb2