Analysis
-
max time kernel
128s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe
-
Size
15KB
-
MD5
eef5afdf802c4266bc6c9e11253122cd
-
SHA1
9ac0696e41af62f9c8d60b95ebb578171a331c03
-
SHA256
7545205195d39a01a2696ec0c3bd63599c28e0de50c5368d676f21535e70addb
-
SHA512
acfefb2e3251ed73866d45ec3ff068559e0a0981abb99900af28ad89ad263b33467e95b04933376f1997bd7056737cbffe0f18f79b6ec81ff2dc2db9ad27a9c4
-
SSDEEP
384:qqPKe+NmiOtoCOQFuZqhYE1Ff4zHQOtiv3Ga:qTHmiOtDOQD7Dfm3tivd
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\wlxzywbv.dll = "{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}" eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wlxzywbv.tmp eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wlxzywbv.nls eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe File created C:\Windows\SysWOW64\wlxzywbv.tmp eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}\InProcServer32\ThreadingModel = "Apartment" eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE} eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}\InProcServer32 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}\InProcServer32\ = "C:\\Windows\\SysWow64\\wlxzywbv.dll" eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2412 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe 95 PID 2480 wrote to memory of 2412 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe 95 PID 2480 wrote to memory of 2412 2480 eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eef5afdf802c4266bc6c9e11253122cd_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F4D.tmp.bat2⤵
- System Location Discovery: System Language Discovery
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5dd84d701a9f7f709bb82500109c9119e
SHA1f2edf91e3d09806292049d196f06e1d7eca028e3
SHA2560ccb837020be7d4e47a573e22bb0bd49582a7130f11efbb4b4e14d8259461a9b
SHA51207d83fd60412091f63b348ecc3d09788bd67e19d5fd7d0961b560c337375a952b05cc4fbedc8ed30f5e3dc57acb8756aee4e20854badf26a3271418fc84e41a5
-
Filesize
428B
MD5ec4b97327b1530fe6493568039318323
SHA1523d3b4da6276d57e2c31d0e7a878fdcc4405a8e
SHA256669af1ee6f04e3897689a45e4b4254a9418b3b0db9ae2f669b78366f80042840
SHA512771b1a10d7b62c19df4f2dc0a2b81ca23fc3af7b712bee0556c6eeffef5e8a36d2c1b7e7da86d9c523c444263b7edcd5576640b16abbe5fcf1e45decadbc9693
-
Filesize
2.5MB
MD5d19cc89fedfce7566374bbd463b5aa98
SHA1d80abf858608d9f82a26169d789494528efccf43
SHA25659cce95a3d702a37e888832e79655ff22393365eeefb3999f1a31cda12bb7adb
SHA51207d7c27acdf040872ce171b8910a5a9a319c092d5be2f99d2c9a71a447dfa7c657079b76d626097854c9208a8ea0bccc957418191a32d3b92a93740813162613