Analysis
-
max time kernel
148s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe
-
Size
743.2MB
-
MD5
b68992b9be1f32714012077281d32ae5
-
SHA1
ada549e2149aa98d23698ce83cb2bfbd7a0733d7
-
SHA256
48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82
-
SHA512
91563d3fa41ef36e011893d7d8f28b0f07fafc7e18baaf00457bc9fb29ab58e0b65bc9c635f86d0411ff6c74e928bfc023dffa446dae259f2c562c1d625b6d02
-
SSDEEP
12582912:WeWtmxGq+R7PARz/CH2YQs8crIrBHKQeWVtZ+eCf6GcvcdJSClWizwdpqqXidmP:WfsGLP+z/M2YQs88Wpek26qdJSC8zdMQ
Malware Config
Extracted
laplas
194.87.216.44
-
api_key
78a51faf154353b4ff80910568eebfcad84a2c21884e8e575d7e536b57a06b32
Signatures
-
Laplas family
-
Executes dropped EXE 1 IoCs
pid Process 1136 XFlgWNZsQh.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1624 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe 1136 XFlgWNZsQh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XFlgWNZsQh.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2356 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1624 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 1136 XFlgWNZsQh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2328 1624 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 31 PID 1624 wrote to memory of 2328 1624 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 31 PID 1624 wrote to memory of 2328 1624 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 31 PID 1624 wrote to memory of 2328 1624 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 31 PID 2328 wrote to memory of 2356 2328 cmd.exe 33 PID 2328 wrote to memory of 2356 2328 cmd.exe 33 PID 2328 wrote to memory of 2356 2328 cmd.exe 33 PID 2328 wrote to memory of 2356 2328 cmd.exe 33 PID 2252 wrote to memory of 1136 2252 taskeng.exe 35 PID 2252 wrote to memory of 1136 2252 taskeng.exe 35 PID 2252 wrote to memory of 1136 2252 taskeng.exe 35 PID 2252 wrote to memory of 1136 2252 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn cvAYqJhxHe /tr C:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn cvAYqJhxHe /tr C:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2356
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6E47ED9E-42AB-4E1A-B7D4-6ED76D3B9DB9} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exeC:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1136
-