Analysis
-
max time kernel
106s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe
-
Size
56KB
-
MD5
fd944c4255de42d17942fec624bc4674
-
SHA1
e333ccf39c83dfa4d30b1639358532a6e5ee3ea4
-
SHA256
68d70d749a7f781fa0ea6e41f71eb34e21111bdf674182b74d79bbb17b4c785a
-
SHA512
bed1d36962ddc58e5eb916296b419ba54ef01a7f709a8d6e0ee988b0f4c1cb08fd3253c82d00ebac6fab9d9682c8bb524c40936890ee4fa01d48ea0d6e08d0ea
-
SSDEEP
768:498dt9IfgSyiBoFRJ5L5BPhHvhhiVoi3Nm2M9f+BSUImDpJ92WyF6EJGpNoyGE:40cyqwJ5PlhHF26UvpL2Wx0GNoy
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run rijujcdu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\r3k60WQiMy = "C:\\ProgramData\\lmxoleni\\rijujcdu.exe" rijujcdu.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 rijujcdu.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rijujcdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3880 fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1684 3880 fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe 92 PID 3880 wrote to memory of 1684 3880 fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe 92 PID 3880 wrote to memory of 1684 3880 fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe 92 PID 3880 wrote to memory of 436 3880 fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe 93 PID 3880 wrote to memory of 436 3880 fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe 93 PID 3880 wrote to memory of 436 3880 fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd944c4255de42d17942fec624bc4674_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\ProgramData\lmxoleni\rijujcdu.exeC:\ProgramData\lmxoleni\rijujcdu.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\FD944C~1.EXE.bak >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5fd944c4255de42d17942fec624bc4674
SHA1e333ccf39c83dfa4d30b1639358532a6e5ee3ea4
SHA25668d70d749a7f781fa0ea6e41f71eb34e21111bdf674182b74d79bbb17b4c785a
SHA512bed1d36962ddc58e5eb916296b419ba54ef01a7f709a8d6e0ee988b0f4c1cb08fd3253c82d00ebac6fab9d9682c8bb524c40936890ee4fa01d48ea0d6e08d0ea