Analysis
-
max time kernel
138s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 02:42
Behavioral task
behavioral1
Sample
JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe
-
Size
688.3MB
-
MD5
c074776efe5f5e01133668620cd4bd4a
-
SHA1
8bba29b1e9967e1462678d3b9c1b0dd9e4ff5769
-
SHA256
5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689
-
SHA512
2c53101f3351c52ee503f58793ae09f77459f34316c66767d88fe156f677eeb0fd82e1410ef4b9a9f4e974b1240d21ada4810619b232a44bc15bb0095b85c454
-
SSDEEP
12582912:1BfUe4f+Di3T5/E/sqc6P2dEPXXopPsGv7jVyntuJ6Hp0pOE:16e4TNE/sHEfXouS7jYtHLE
Malware Config
Extracted
laplas
45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Signatures
-
Laplas family
-
Executes dropped EXE 1 IoCs
pid Process 8 dFpyYTIgnO.exe -
resource yara_rule behavioral2/memory/660-0-0x0000000000440000-0x0000000000E57000-memory.dmp vmprotect behavioral2/memory/8-7-0x0000000000640000-0x0000000001057000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dFpyYTIgnO.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 956 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 660 wrote to memory of 4640 660 JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe 82 PID 660 wrote to memory of 4640 660 JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe 82 PID 660 wrote to memory of 4640 660 JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe 82 PID 4640 wrote to memory of 956 4640 cmd.exe 84 PID 4640 wrote to memory of 956 4640 cmd.exe 84 PID 4640 wrote to memory of 956 4640 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5a428ad80b5e9a5204b238dca8617696d2d4efbdc07366d5c897405b24782689.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn tasibxGgUe /tr C:\Users\Admin\AppData\Roaming\tasibxGgUe\dFpyYTIgnO.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn tasibxGgUe /tr C:\Users\Admin\AppData\Roaming\tasibxGgUe\dFpyYTIgnO.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:956
-
-
-
C:\Users\Admin\AppData\Roaming\tasibxGgUe\dFpyYTIgnO.exeC:\Users\Admin\AppData\Roaming\tasibxGgUe\dFpyYTIgnO.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8