Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe
-
Size
153KB
-
MD5
171029aa1b2fb70e327a4954d9b2aa20
-
SHA1
fbd2a6a8ed5a1b4d66ab3d25280fe5016ca56a12
-
SHA256
15a7e0deb10ed66a4fc154762aa9cebd0b1f57aaf2f2455fbe3b4408d5fd488b
-
SHA512
56c2db8d0cc8b09cc74c1ec1a0415df143185d6a0a41796a25178cc37b447a990f18f2820d3311c9321729f4bd43f0fab7b27aa46a85964d6189f054b5a502c2
-
SSDEEP
3072:ykZCrvugF1PG2+pCPNDrht5YMIaVRsRsOj8cbsbtH:y4Crvug22nP9CmV6f8cGH
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 4564 gmbbhqc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\gmbbhqc.exe 171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\wyqjizb.dll gmbbhqc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmbbhqc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\171029aa1b2fb70e327a4954d9b2aa20_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4364
-
C:\PROGRA~3\Mozilla\gmbbhqc.exeC:\PROGRA~3\Mozilla\gmbbhqc.exe -davvhfe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3932,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD5c095e42ffd5013a928a3c1737c902bab
SHA17eda93df17577d9a99af421d03e55cc4e1780e22
SHA25648e14c01ba6b00abfb0f166eca3057da720dc31e86d8d277f86c32ff0b294672
SHA512b141d9aad56c809e9deb8338ef6dfa3d7b5b6a8bae491cf7efc3e0899194ad15b843240f74ecc528b7585cfde0fb631fd484e6b3e1085ef2b593ce7067ede748