Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/eBB0pB0f.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/eBB0pB0f.dll
Resource
win10v2004-20241007-en
General
-
Target
2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe
-
Size
70KB
-
MD5
2c6c1b2808d13cabcbc5f8c49e0b1fea
-
SHA1
9d22aa6b951fa8816929825f921ff091b042e8b5
-
SHA256
5134c24248e33b31f66645e582ac519e641d095f2481474590bc23a8305f0f97
-
SHA512
f3d446da25c1a3e10f8f11ac52a866bafedb7a7b601cbb213a0961ad85d4ff37c7b60a7c041f04a6a414c8efabff195e852551971eb07b128317e3f7cd6c1974
-
SSDEEP
1536:ypx5p1Of5eYpL2LBTsw/S0D6mJ97jjVRKYYx4JRF4SNvUqdnPNrHk:ybr1YUfD6mJ9XmHUFLZPS
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4860 regsvr32.exe 844 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\appwsd8 = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\appwsd8\\appwsd8.dll\", DllInit" regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 844 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2256 wrote to memory of 4860 2256 2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe 83 PID 2256 wrote to memory of 4860 2256 2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe 83 PID 2256 wrote to memory of 4860 2256 2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe 83 PID 4860 wrote to memory of 844 4860 regsvr32.exe 84 PID 4860 wrote to memory of 844 4860 regsvr32.exe 84 PID 4860 wrote to memory of 844 4860 regsvr32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c6c1b2808d13cabcbc5f8c49e0b1fea_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /i /n /s "C:\Users\Admin\AppData\Local\Temp\eBB0pB0f.dll"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\appwsd8\appwsd8.dll", DllInit3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5511b14e45e69fd50a7048fb92326e334
SHA1b46dc390e98c0c43c2f656349f808fa24ec77fa6
SHA256a90e31101d6f8d16055d7a0bdc904fa017aaedc3c8f28ca7b340a6d50d3488d9
SHA512ea7da6c50b5a3753f560d06f3d081d430562dd3bad8b7d2d75ad973720bbcf92a44f9248b9bda9a397063a66361885247d71a72927a84992ebaa45537562757c