Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 08:45
Behavioral task
behavioral1
Sample
12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
12a271ee27ff726257f0f7d39db26a79
-
SHA1
16b1f6d741d718056b3fbb72a08f44ee87905f6c
-
SHA256
b7b905559cca5b1b2ff4cd4a23a5e310cf3056efafcc65af10dddf6f10491e12
-
SHA512
82a9d31d49e928d1019c53573697ba8ea3d612756028855868376ef17dd2fdd95b0fcec3ba814afc46347126bdafaecdc8b3ae82114824242a27259c7138ac05
-
SSDEEP
24576:3JqwxN7bIX1a0kXey0pD9n4iXdlmT4tXqZSP76IBqSgVc0qbvp0YaOSJecBvk6k1:ZfbIX1UePz4iXGTEPOVSg7kp0YaOee0U
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE -
resource yara_rule behavioral2/memory/1180-0-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-1-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-23-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-24-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-25-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-26-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-27-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-28-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-29-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-30-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-31-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-32-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-33-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-34-0x0000000000400000-0x000000000058B000-memory.dmp upx behavioral2/memory/1180-35-0x0000000000400000-0x000000000058B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runonce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUNDLL32.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1180 12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2728 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2728 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1180 12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe 1180 12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2860 1180 12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe 85 PID 1180 wrote to memory of 2860 1180 12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe 85 PID 1180 wrote to memory of 2860 1180 12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe 85 PID 2860 wrote to memory of 1380 2860 RUNDLL32.EXE 86 PID 2860 wrote to memory of 1380 2860 RUNDLL32.EXE 86 PID 2860 wrote to memory of 1380 2860 RUNDLL32.EXE 86 PID 1380 wrote to memory of 1016 1380 runonce.exe 87 PID 1380 wrote to memory of 1016 1380 runonce.exe 87 PID 1380 wrote to memory of 1016 1380 runonce.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12a271ee27ff726257f0f7d39db26a79_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\RUNDLL32.EXERUNDLL32.EXE SETUPAPI.DLL,InstallHinfSection DefaultInstall 132 C:\Users\Admin\AppData\Local\Temp\swflash64.inf2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵
- System Location Discovery: System Language Discovery
PID:1016
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x498 0x4e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD560c0b6143a14467a24e31e887954763f
SHA177644b4640740ac85fbb201dbc14e5dccdad33ed
SHA25697ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58
SHA5127032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f