Analysis
-
max time kernel
95s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll
-
Size
1.0MB
-
MD5
ef6b9c22aa1630dbe3ae9ece27a42388
-
SHA1
fd28d2097d29ae003d3dfcfd3d6fcd431b19df22
-
SHA256
b075c5f47e03a3c0dfa2fefc974f283674042ecfc5e3b2361646aea041e42594
-
SHA512
1c4678b79bd5df66a482e7b675cc59ab47afd2504f0299780f5ba4ac4d50fcc2922810ea711e643b7840d2b2803868dbbfc7b4ec9cf45a64147dc6c0adc11da2
-
SSDEEP
24576:syZe4m2RBWSuBRJfAcEMtGziooofCmi8bVdbCL:sWtRANBRJfAuZ8KloW
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000a000000023459-4.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 2272 pclA383.exe 4408 nbdr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nbdr.exe pclA383.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pclA383.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3732 PING.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234c7-11.dat nsis_installer_1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3732 PING.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3352 wrote to memory of 2840 3352 rundll32.exe 82 PID 3352 wrote to memory of 2840 3352 rundll32.exe 82 PID 3352 wrote to memory of 2840 3352 rundll32.exe 82 PID 2840 wrote to memory of 2272 2840 rundll32.exe 83 PID 2840 wrote to memory of 2272 2840 rundll32.exe 83 PID 2840 wrote to memory of 2272 2840 rundll32.exe 83 PID 2272 wrote to memory of 4408 2272 pclA383.exe 84 PID 2272 wrote to memory of 4408 2272 pclA383.exe 84 PID 2272 wrote to memory of 4408 2272 pclA383.exe 84 PID 2272 wrote to memory of 2904 2272 pclA383.exe 85 PID 2272 wrote to memory of 2904 2272 pclA383.exe 85 PID 2272 wrote to memory of 2904 2272 pclA383.exe 85 PID 2904 wrote to memory of 3732 2904 cmd.exe 87 PID 2904 wrote to memory of 3732 2904 cmd.exe 87 PID 2904 wrote to memory of 3732 2904 cmd.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef6b9c22aa1630dbe3ae9ece27a42388_JaffaCakes118.dll,#12⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\pclA383.exe"C:\Users\Admin\AppData\Local\Temp\pclA383.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\nbdr.exeC:\Windows\system32\nbdr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\DEL_2406.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\PING.EXEPing 127.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5c1516f8d1e5d795a8b0d15a380fcb69c
SHA1dc54ae3758cc941d81e26779d44a0cf52100dea0
SHA256a9a6f0e13a855694ab3a12afd64e8cde673dc8f893be0c2cee956da611bae5c2
SHA512098aa72e758c5e194c0779acb9a670b69594819193d769363d30e77ac9009dccd3d30362662da59ae21386c679622339084d1507324906a23dbd55ddd58ca345
-
Filesize
561KB
MD53faf9f2e276c13bc9e73403f7fa5896e
SHA1afecaa87a08a4a62a774d935585e4f328ed13197
SHA256f485414b90978616a58d60d55fa37969b4f1690fc4466df1f6836967ef7ad64b
SHA512e5db516b5b607be97c25cad0ca3699b92cc16356663283467815e26ac13775522a953381560ee06b446573525d184e2659dbfc1eef6b02ae4c78a73ad2461823
-
Filesize
527KB
MD5faa32dcff6b3dc36af814a9442e0c2af
SHA12fb8d1848dd297de5580fcee27c0ab98ba4e38f0
SHA2560ce8392ef1496262160ac5768108d5cdec9191b15bfd810cf853dbb5c9cc9a0f
SHA512697c9393c040d0526756122e34607e654fe1924ea522936acd1881dfe043faf097d1810379fb857b0c95c7b48fb7320129c4128954afc1634d708714d47cf2c4