Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 04:19

General

  • Target

    2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe

  • Size

    404KB

  • MD5

    2ab3847f9361958e03117949941a90f0

  • SHA1

    90a2f9dace67d73f09c2d6db7690431e7db559c9

  • SHA256

    0deeeade7a05a4ccab0a45cc58a4dc2617c64ac26d6f327f0d7ff99ba2c0b6fc

  • SHA512

    cd5af8a2d17644dd58ed1ed64bcd5cfd47737035ae333cd221d225677c8a1457995eedcbd13d29d672832e76aa549904e1ba730d805e44dd9684cf00cc6b6db2

  • SSDEEP

    3072:yRJaB1kSpqQa0CQdw2ldhKNiIqALGel5MkVfu04+tzsIpd+pA6J+GvS2jbxWGqJ2:WaB2QXdLamveAkVfujHacpq2SbGqJ2

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1556
  • C:\PROGRA~3\Mozilla\nzlncpi.exe
    C:\PROGRA~3\Mozilla\nzlncpi.exe -juyvuof
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3428

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Mozilla\nzlncpi.exe

          Filesize

          404KB

          MD5

          6ecf0b7aedb091128ae11242af5ccd8f

          SHA1

          ed1ded3a54e22f3f197fac116e706f67963b862d

          SHA256

          bae1ada50eb999767d32ea11c8597b0cf9d50082ecf92669b4125bce6186dd14

          SHA512

          05ae56a86198c32d42bf3a620400889c5ffa5de2ccf0ee7bf8c07247cece922e5bfad198bf0f461547347c764b35c0ca77f66fbfcac752f68ef9f3f5367f341a

        • memory/1556-0-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/1556-1-0x0000000000780000-0x00000000007DC000-memory.dmp

          Filesize

          368KB

        • memory/1556-2-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1556-10-0x0000000000780000-0x00000000007DC000-memory.dmp

          Filesize

          368KB

        • memory/1556-9-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/3428-6-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/3428-11-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/3428-12-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/3428-14-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB