Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 18:38
Behavioral task
behavioral1
Sample
101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe
-
Size
350KB
-
MD5
101834215641383ab10a96eb3d4e5d5e
-
SHA1
42bc1b3449c2b6a4ed069b850987cde7f64ee1c4
-
SHA256
be61a93b08167a2b0aab9d158387fcc949d4e8c41161b8313e286a75412fd223
-
SHA512
55522818ba50f246663b8cd18dcf24c7be44dc051cf6a8f8fc15d751ed78d526fbee257c84e03359b179ffa3d19af25557083272458396cb5ba4e10c5fc771cc
-
SSDEEP
6144:a8Vp2nPDEsW9DUSrcFnSJfRuSWoHrTq5MebDbDCZKcta3Jp2HX9/DKs:bVpePDPCUu2Ew2re5MebHOZG3v2HX9us
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4988-0-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-2-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-5-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-6-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-7-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-8-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-9-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-10-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-11-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-12-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-13-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-14-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-15-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-16-0x0000000000400000-0x00000000004F4000-memory.dmp upx behavioral2/memory/4988-17-0x0000000000400000-0x00000000004F4000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shell\MOW 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MOW\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MyExtension.exe /mow \"%1\"" 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\background\shellex\ContextMenuHandlers\New 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MyExtension\Command 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Directory\Background 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\ShellEx\ContextMenuHandlers\New 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shell 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shell\MyExtension\Command 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MOW\ = "CMM - My \"Open with &...\" [&.]" 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MOW\Command 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Directory\Background\ShellEx\ContextMenuHandlers 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shell\MyExtension 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shell\MOW\Command 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MyExtension 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\background\shellex\ContextMenuHandlers\New\ = "{D969A300-E7FF-11d0-A93B-00A0C90F2719}" 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\* 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MyExtension\ = "CMM - Alternative Open [&`]" 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Directory\Background\ShellEx 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MyExtension\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MyExtension.exe \"%1\"" 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\MOW 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 2624 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 84 PID 4988 wrote to memory of 2624 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 84 PID 4988 wrote to memory of 2624 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 84 PID 4988 wrote to memory of 3744 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 88 PID 4988 wrote to memory of 3744 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 88 PID 4988 wrote to memory of 3744 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 88 PID 4988 wrote to memory of 628 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 92 PID 4988 wrote to memory of 628 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 92 PID 4988 wrote to memory of 628 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 92 PID 4988 wrote to memory of 2908 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 94 PID 4988 wrote to memory of 2908 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 94 PID 4988 wrote to memory of 2908 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 94 PID 4988 wrote to memory of 3616 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 97 PID 4988 wrote to memory of 3616 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 97 PID 4988 wrote to memory of 3616 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 97 PID 4988 wrote to memory of 5088 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 100 PID 4988 wrote to memory of 5088 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 100 PID 4988 wrote to memory of 5088 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 100 PID 4988 wrote to memory of 2544 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 102 PID 4988 wrote to memory of 2544 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 102 PID 4988 wrote to memory of 2544 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 102 PID 4988 wrote to memory of 2148 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 103 PID 4988 wrote to memory of 2148 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 103 PID 4988 wrote to memory of 2148 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 103 PID 4988 wrote to memory of 4708 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 105 PID 4988 wrote to memory of 4708 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 105 PID 4988 wrote to memory of 4708 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 105 PID 4988 wrote to memory of 2468 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 107 PID 4988 wrote to memory of 2468 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 107 PID 4988 wrote to memory of 2468 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 107 PID 4988 wrote to memory of 452 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 108 PID 4988 wrote to memory of 452 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 108 PID 4988 wrote to memory of 452 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 108 PID 4988 wrote to memory of 400 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 110 PID 4988 wrote to memory of 400 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 110 PID 4988 wrote to memory of 400 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 110 PID 4988 wrote to memory of 1688 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 111 PID 4988 wrote to memory of 1688 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 111 PID 4988 wrote to memory of 1688 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 111 PID 4988 wrote to memory of 3980 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 113 PID 4988 wrote to memory of 3980 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 113 PID 4988 wrote to memory of 3980 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 113 PID 4988 wrote to memory of 2072 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 115 PID 4988 wrote to memory of 2072 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 115 PID 4988 wrote to memory of 2072 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 115 PID 4988 wrote to memory of 964 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 117 PID 4988 wrote to memory of 964 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 117 PID 4988 wrote to memory of 964 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 117 PID 4988 wrote to memory of 4328 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 119 PID 4988 wrote to memory of 4328 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 119 PID 4988 wrote to memory of 4328 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 119 PID 4988 wrote to memory of 3724 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 121 PID 4988 wrote to memory of 3724 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 121 PID 4988 wrote to memory of 3724 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 121 PID 4988 wrote to memory of 1920 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 123 PID 4988 wrote to memory of 1920 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 123 PID 4988 wrote to memory of 1920 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 123 PID 4988 wrote to memory of 1636 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 125 PID 4988 wrote to memory of 1636 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 125 PID 4988 wrote to memory of 1636 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 125 PID 4988 wrote to memory of 5044 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 126 PID 4988 wrote to memory of 5044 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 126 PID 4988 wrote to memory of 5044 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 126 PID 4988 wrote to memory of 4680 4988 101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\101834215641383ab10a96eb3d4e5d5e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:3616
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 Shell32.dll,Options_RunDLL2⤵PID:5016
-