Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe
-
Size
404KB
-
MD5
2ab3847f9361958e03117949941a90f0
-
SHA1
90a2f9dace67d73f09c2d6db7690431e7db559c9
-
SHA256
0deeeade7a05a4ccab0a45cc58a4dc2617c64ac26d6f327f0d7ff99ba2c0b6fc
-
SHA512
cd5af8a2d17644dd58ed1ed64bcd5cfd47737035ae333cd221d225677c8a1457995eedcbd13d29d672832e76aa549904e1ba730d805e44dd9684cf00cc6b6db2
-
SSDEEP
3072:yRJaB1kSpqQa0CQdw2ldhKNiIqALGel5MkVfu04+tzsIpd+pA6J+GvS2jbxWGqJ2:WaB2QXdLamveAkVfujHacpq2SbGqJ2
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 3428 nzlncpi.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\nzlncpi.exe 2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe File created C:\PROGRA~3\Mozilla\tozvehh.dll nzlncpi.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzlncpi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ab3847f9361958e03117949941a90f0_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1556
-
C:\PROGRA~3\Mozilla\nzlncpi.exeC:\PROGRA~3\Mozilla\nzlncpi.exe -juyvuof1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD56ecf0b7aedb091128ae11242af5ccd8f
SHA1ed1ded3a54e22f3f197fac116e706f67963b862d
SHA256bae1ada50eb999767d32ea11c8597b0cf9d50082ecf92669b4125bce6186dd14
SHA51205ae56a86198c32d42bf3a620400889c5ffa5de2ccf0ee7bf8c07247cece922e5bfad198bf0f461547347c764b35c0ca77f66fbfcac752f68ef9f3f5367f341a