Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe
-
Size
115KB
-
MD5
f5c20f991f75fa7aa8e1500b7c5675e9
-
SHA1
76732f30ee4e8303b3c49412eaf7b7ef8fcf0afc
-
SHA256
d5e3cd558650601bcd3276f3b430e6ab18f4b559731352d0bc10b0641c73126a
-
SHA512
3ee5592031b96adb3db69f790830450d200f6ba2818c194f6483cb71723a9b18c0f950ac77ba7fcc268cd4efd884e55425f83f64999e0f39c898d04f4f977cce
-
SSDEEP
1536:kNTXdukZkJqEtQ75et9DmupKGMR5WWMqCC3WZtfkX6UjbwNVGKJl3WBSACCoOujS:nUkJq99kfUzMqYgIEstWsvHK/nDkQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4528 Exsprlorer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Exsprlorer.exe f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe File created C:\Windows\Exsprlorer.exe f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exsprlorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Exsprlorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Exsprlorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Exsprlorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Exsprlorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Exsprlorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe 4544 f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1936 4544 f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe 85 PID 4544 wrote to memory of 1936 4544 f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe 85 PID 4544 wrote to memory of 1936 4544 f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5c20f991f75fa7aa8e1500b7c5675e9_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a22058$$.bat2⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Windows\Exsprlorer.exe"C:\Windows\Exsprlorer.exe" /service1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53b4c5c876cab6dba1fdb464f8b00a39a
SHA143690a2834a86d76bfeb9c936a5fd87ca69d2086
SHA25611b11bc5f2731c8fdf0ffde24af9a04306104f5a5297ecd1627ae9ffa004ad49
SHA512b4817effad0515cc5ff5336fd83620debdb1c6de51234205aa433b7e02f793d0a3db832907ef757a65e255daba7a837ed75a15da570e3e2121f01615d622ab3d
-
Filesize
115KB
MD5f5c20f991f75fa7aa8e1500b7c5675e9
SHA176732f30ee4e8303b3c49412eaf7b7ef8fcf0afc
SHA256d5e3cd558650601bcd3276f3b430e6ab18f4b559731352d0bc10b0641c73126a
SHA5123ee5592031b96adb3db69f790830450d200f6ba2818c194f6483cb71723a9b18c0f950ac77ba7fcc268cd4efd884e55425f83f64999e0f39c898d04f4f977cce