Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe
-
Size
52KB
-
MD5
001b3c98108c5b8c3d4096cf4131976f
-
SHA1
610d2199bd3ee28ae0b3761158cdd0b628b2f4c6
-
SHA256
de599f4c0962f8ffc5fac2cada0bdbb59c19e2d454948de0ec9ba4a16766d1e1
-
SHA512
db55f0761d094b0b833299445953a5544ede7d42673b53525d2b615015b9c691630ff82e81d51feb9e2b054bad2aaabf68eeb1d72a152c75e5e95a05f0c40a63
-
SSDEEP
1536:IriwVekTuv1pfAF66cHd94//RY2zGlHygr:IjQfv1p6q9vyU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 NTdhcp.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\NTdhcp.exe 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe NTdhcp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Deleteme.bat 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NTdhcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2252 4644 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe 82 PID 4644 wrote to memory of 2252 4644 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe 82 PID 4644 wrote to memory of 2252 4644 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe 82 PID 4644 wrote to memory of 3880 4644 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe 83 PID 4644 wrote to memory of 3880 4644 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe 83 PID 4644 wrote to memory of 3880 4644 001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\001b3c98108c5b8c3d4096cf4131976f_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\NTdhcp.exeC:\Windows\system32\NTdhcp.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:3880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5bea35de71d357b78c37f2bda70ccc159
SHA1e765c3fdf3877ceb679a0a589a8236645f399138
SHA2564e35e9592662f5006c20384005b76128094889627c8a5dcdabc25f8a9b568b9b
SHA51267cf32bb8a6b0549805c32c46597a20ae31301e9a265234504c896da87d9de5f62fb998952ad4fd99f54f661ce8d7d4f5703843d0c6714e40891e83f9590e872
-
Filesize
52KB
MD5001b3c98108c5b8c3d4096cf4131976f
SHA1610d2199bd3ee28ae0b3761158cdd0b628b2f4c6
SHA256de599f4c0962f8ffc5fac2cada0bdbb59c19e2d454948de0ec9ba4a16766d1e1
SHA512db55f0761d094b0b833299445953a5544ede7d42673b53525d2b615015b9c691630ff82e81d51feb9e2b054bad2aaabf68eeb1d72a152c75e5e95a05f0c40a63