Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 18:36

General

  • Target

    ee322df68bbadb138bf4df26406fd51b_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    ee322df68bbadb138bf4df26406fd51b

  • SHA1

    42fc56cb71fe9d32f5c1efea0ae5f617c985b737

  • SHA256

    dcf2ccde10e098cd1990b28329c0d4486aa892c12b2f561707286c4151437dc2

  • SHA512

    d22cfec39d3b8638189f99027fb023d2653618b7ee9b2d2c18157cde13d91c2e050455094dac2f250f5dc328f660d9a0c7906d30c4ba646924d66892c3172c18

  • SSDEEP

    192:qzUNcknUK9NrAW58dG3Di+gmWVGnTnohnznQu6brA+eaNLlulxhaewV96ltFJKsW:tckUKzifdVGTnmnsneyLlu5dGQltF9A

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee322df68bbadb138bf4df26406fd51b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee322df68bbadb138bf4df26406fd51b_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\2F87.tmp.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2F87.tmp.bat

    Filesize

    207B

    MD5

    0c29013c6a2c6bb3dcfd8873c445bfc2

    SHA1

    5a186a8f6ee64290b3fa8252ce83e2452834f6d5

    SHA256

    18a93f0e94c314e507d01a2d22451de85269a51f1ced664f5c402b3752b582ea

    SHA512

    cdddff7d541efcc3e8abd08dfce7d8bce9115d54e7068d97089ba2e7f0ed71401fe5d7f09d4e44f4af13fb817132988ec641efc8dc66fa469a582ca35f5fea0d

  • C:\Windows\SysWOW64\zeklrdyb.nls

    Filesize

    428B

    MD5

    6cac05b5957f373b66b604b1471d8075

    SHA1

    9fb752492b972c8e449a47841f5238e2d0e9bc39

    SHA256

    9211b00f44ebe366c866a0e00d7e68ee5670e27307cabacefcb6fd2ead2e6df3

    SHA512

    88cc988bdc434f91757c0b43a01b90140ffd6dabad196ef418a1ed7009268904a65dd9be54f82da4562607438b942b6f74c48f13839c65ba14b47fc026c134c6

  • C:\Windows\SysWOW64\zeklrdyb.tmp

    Filesize

    2.0MB

    MD5

    84368f0034bac7bba09fe39951a0c27b

    SHA1

    f4e3ab580696950197e6827ac961892b429281c4

    SHA256

    b75e6e74e8daf68df67b7353cf23974576306d98584a7d84658d75ffdcee46b5

    SHA512

    bf5dc342801505cddd269804a4cbd59dada7ec5ba2adbc8d127e25ea2559ea7a50b3ba156a23b6e7f570522ddff1329b4614c4f3c6fef7b7b270b5988c2c956d

  • memory/3084-17-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/3084-22-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB