Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 23:11

General

  • Target

    10dc115a86943036cbd81089436e1d20_JaffaCakes118.exe

  • Size

    127KB

  • MD5

    10dc115a86943036cbd81089436e1d20

  • SHA1

    ae25056e9fa9b30b4c463e871b8e997847268a7e

  • SHA256

    5187d110c4c70debf4b973518d19ffd19f2fba3601b346299420a2c0877690cb

  • SHA512

    3dc142d1eedf5b1f54ab166bd22e27bcf8a4af1e500012a01d7abfa00230522777ba625d30afc8f56fee479aa687508f92bb2c841670c68acdc4f7673b3778c7

  • SSDEEP

    1536:DnlOT70kxlPrM65yKxwhO+ozPp575shBapiDZWvdeH2I:DnlKU65yKMC75k74eHX

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10dc115a86943036cbd81089436e1d20_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\10dc115a86943036cbd81089436e1d20_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\rqlrngaa.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:508
      • C:\Windows\SysWOW64\rqlrngaa.exe
        C:\Windows\system32\rqlrngaa.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8A3E.tmp

    Filesize

    4.3MB

    MD5

    6c7cdd25c2cb0073306eb22aebfc663f

    SHA1

    a1eba8ab49272b9852fe6a543677e8af36271248

    SHA256

    58280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705

    SHA512

    17344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6

  • C:\Windows\SysWOW64\rqlrngaa.exe

    Filesize

    48KB

    MD5

    3aaf242a2ab09f830124b35e14fd8dc4

    SHA1

    13ecbcadbd628f4d0627d206b427a799f8ec83b6

    SHA256

    671e17f8877a15d478efa96114cc640d17478a65da5f5a63e7f2e360c7aa7b18

    SHA512

    265b88e41114f9d96789a4aeeeed57dd200a2719e989b397ce2929a09c993ede6d9a8fd1aa5c1b553f41feae497048229606e9e184697e3af1ebdef894e89d6d

  • memory/1600-1-0x0000000000690000-0x00000000006B3000-memory.dmp

    Filesize

    140KB