Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 05:22

General

  • Target

    12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe

  • Size

    49KB

  • MD5

    12015299ab4645aae7f99d4516a0dd3c

  • SHA1

    d8b2a29bb6a2924e382f7546827ac5437f705a89

  • SHA256

    659918f9b61c39cce96be45969d809fbf096b9c25a9c3cd2f8db583978436c1a

  • SHA512

    c5c0d48bf1ded83155bdab796ee268ef028be065b3e818124c710c50c15deac3da168e7b04629580c7b29e8b39e5786cabc917cd5416147b50f556357014ea4b

  • SSDEEP

    768:FnAYThnRJfc3O9wVI+dOaRbYxZCHfsNqmBJHXnNKbqKB9ntasFS6rjnBusNn9BxI:FAkk3fLpRbYnKcZXnNCJB/EwBug9z1q

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Users\Admin\AppData\Local\Temp\12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\system32\iifgHaaY.dll,a
        2⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\system32\ssqRKeda.dll",s
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2716
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\khfDwtrq.bat "C:\Users\Admin\AppData\Local\Temp\12015299ab4645aae7f99d4516a0dd3c_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\khfDwtrq.bat

      Filesize

      87B

      MD5

      93d56922d7c4815cbad2b701bcab179e

      SHA1

      f74a1b3c166f69a0f2409943786c0fbbe6cd77b7

      SHA256

      89f976a695b6e64721f2e9a7715a21e628fe8506a908051f75db888403557037

      SHA512

      08d690e62c6246fec8664f0876cf0b16cdbbcd9452e6d7bf011a1d4b6de91276e3cb9b2ae7cd9f0adf3a7219b96d3cbc177701d5019d443961c77ff32baf0fd2

    • C:\Windows\SysWOW64\iifgHaaY.dll

      Filesize

      36KB

      MD5

      11fef9151eacaddbcdbf60505bcfbb01

      SHA1

      afc20ada5a71726e90557fbca4d41aa66fb42d56

      SHA256

      a83b51bf8a27ef34f27c2da99d9d0e74ff2672c50b8c289b229d27bfe92208db

      SHA512

      066f4b8f84e5197191694bf5312e7ad9795f8a418b6227dcbd57f992af4f8fc36122472c7bfac54efc7aea1f257928da33291f0d44472ec63528ace208eb4f6d

    • C:\Windows\SysWOW64\ssqRKeda.dll

      Filesize

      1KB

      MD5

      119cc56e37e487451a8d8154da9a12aa

      SHA1

      77271fce7fff231f2bdc43ec6d5d4c438a49462c

      SHA256

      590b41a47419aa20bfe288c9a33b647952ff6dad47902adbfeee65936e1a471a

      SHA512

      369af5ef0ef0e1e16fe97711e9ec70071f536429bc101307aef3c0e42aef3836ec35f786626c00d0c6e136b315e07f8795fc576080af48ccf1e3303d8eaa8d64

    • memory/676-11-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB

    • memory/676-8-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB

    • memory/676-9-0x0000000002170000-0x0000000002175000-memory.dmp

      Filesize

      20KB

    • memory/676-0-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/676-2-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/676-1-0x0000000002170000-0x0000000002175000-memory.dmp

      Filesize

      20KB

    • memory/4508-17-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB

    • memory/4508-18-0x0000000000CE0000-0x0000000000CE5000-memory.dmp

      Filesize

      20KB

    • memory/4508-19-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB

    • memory/4508-29-0x0000000000CE0000-0x0000000000CE5000-memory.dmp

      Filesize

      20KB

    • memory/4508-30-0x0000000010000000-0x0000000010015000-memory.dmp

      Filesize

      84KB