Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:59
Behavioral task
behavioral1
Sample
53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe
-
Size
91KB
-
MD5
53f01d84fb732cfb079e77ae115f697f
-
SHA1
92af9eb2c5f92a32d772e00b6638370a0661f12e
-
SHA256
42b39ba8c4f4c3b71a7962e519bf3511c4697d49bc9fad322bc497da14256f2e
-
SHA512
1160d6ca2ee1333f05a70436a0fc4df4e2f9d56fba04f35f6f1041e2ef90c106b8af91ec8f38212d029a1af54f879d9c0e9a11685687ea8a2100216b2b7c57a3
-
SSDEEP
1536:YQTMChuyedoa425zOjRpS0Jt1DP5LqA2y+W0B7GBva49O5bfETDDyaTE:FMCh83425z6xT1LRqA1+31GB39OIE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 964 D.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2536-0-0x0000000001000000-0x0000000001025000-memory.dmp upx behavioral2/memory/2536-16-0x0000000001000000-0x0000000001025000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 964 D.exe 964 D.exe 964 D.exe 964 D.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2536 wrote to memory of 964 2536 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 83 PID 2536 wrote to memory of 964 2536 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 83 PID 2536 wrote to memory of 964 2536 53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe 83 PID 964 wrote to memory of 3412 964 D.exe 56 PID 964 wrote to memory of 3412 964 D.exe 56 PID 964 wrote to memory of 3412 964 D.exe 56 PID 964 wrote to memory of 3412 964 D.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53f01d84fb732cfb079e77ae115f697f_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5f52ae6078b24eb3c0ea35740925e6e72
SHA195c369ec7d93463e3dc973b64f183b92442eb560
SHA25678c11eca319bfea0a94476996bab294301785ae1248a417aa4df8de3ef0c5e72
SHA512d67e79c215b27e93bac3440ff43bb2ecf810f70a5146615f65f74854e93c16cbbf51584044866c42615e07c4f541acf441cdc7463261f6a4f7d72a193dcb8452