Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe
-
Size
120KB
-
MD5
2cbd97b186f3c289a2435319c464abea
-
SHA1
9ed8d0cecd0ff7af514c501478346bb4e3ee9138
-
SHA256
aa008a49cbf122c0aa1f7a965b9719929da90715f87434f38aba4c20c53dcc75
-
SHA512
ef0ed311666bf0a3ab35b58126428328fc9ca419c2d79a755937fdccc4faaa86227568bcb1385ef15f4c118476c21471cdd9e742d2d7b045c870d65518e9985a
-
SSDEEP
3072:mTtYzJDNmf85HY4MOv2Hrl95aUXbVqq3jQy:ZBzHAvHtz5qu9
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3540 rundll32.exe 4572 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Egeba = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\wsvicer.dll\",Startup" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe 3540 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3396 wrote to memory of 3540 3396 2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe 85 PID 3396 wrote to memory of 3540 3396 2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe 85 PID 3396 wrote to memory of 3540 3396 2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe 85 PID 3540 wrote to memory of 4572 3540 rundll32.exe 89 PID 3540 wrote to memory of 4572 3540 rundll32.exe 89 PID 3540 wrote to memory of 4572 3540 rundll32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2cbd97b186f3c289a2435319c464abea_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\wsvicer.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\wsvicer.dll",iep3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5314ab339907d8a33594dd3e34fd8667e
SHA19e26023b99fb83f4cbbb75b3c65301fc77ce4be0
SHA2564666b6e44d5acf8930456833923845c3f88cce2ed587152eeaf84dfd5d81c470
SHA512cb9170f1e64d6ff6316c932f255141cc9318c7f65de64b50de1808d4bf9dfed8e02593c5be2a3f47f4d48c7b27c669112c48d90f25b4d284a334c8573ac4092f