Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
2625c9b9cf2129e037f10444f07c0940_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2625c9b9cf2129e037f10444f07c0940_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2625c9b9cf2129e037f10444f07c0940_JaffaCakes118.exe
-
Size
413KB
-
MD5
2625c9b9cf2129e037f10444f07c0940
-
SHA1
81fb2b30010f0069cdfa930a02c2cbe5d4b95895
-
SHA256
dbb741f53fa264dbc3c9078a78069d4f16218ffda1ee465868efe50eaf306168
-
SHA512
f96cbce9c972bed22795fcf61fa2ab9ef978062de278b53530b44fceaaf66970f932a0e6430c13799f0ead366ab3d0fc362e641401c3a30b4cc69edc0fd65d25
-
SSDEEP
12288:Iu3URWtsYf8PemjE8h0UxH9ND6fvhMrfn:IkQe8PemjTh0Ul/8vh+v
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 1620 nzlncpi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nzlncpi.exe 2625c9b9cf2129e037f10444f07c0940_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\tozvehh.dll nzlncpi.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2625c9b9cf2129e037f10444f07c0940_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzlncpi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2625c9b9cf2129e037f10444f07c0940_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2625c9b9cf2129e037f10444f07c0940_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1804
-
C:\PROGRA~3\Mozilla\nzlncpi.exeC:\PROGRA~3\Mozilla\nzlncpi.exe -juyvuof1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD5d40069806b6ab5a0726c0ec4b231d8db
SHA17ab7b882ba497be79f2abfae2fdd1748d9f42002
SHA2562da39608296e2a66adb9f8265f53969195cc1a91c3b83f5e2f2c9127f688fab0
SHA51266cd221e1c269a89ff332888356bee413ac65c0c7d88d56c1cddaa1bfaae8b2ab069c3880ef8fbdfca37c221665e83231937b0e537b0912827a68cee659914fc