Analysis
-
max time kernel
152s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe
-
Size
743.2MB
-
MD5
b68992b9be1f32714012077281d32ae5
-
SHA1
ada549e2149aa98d23698ce83cb2bfbd7a0733d7
-
SHA256
48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82
-
SHA512
91563d3fa41ef36e011893d7d8f28b0f07fafc7e18baaf00457bc9fb29ab58e0b65bc9c635f86d0411ff6c74e928bfc023dffa446dae259f2c562c1d625b6d02
-
SSDEEP
12582912:WeWtmxGq+R7PARz/CH2YQs8crIrBHKQeWVtZ+eCf6GcvcdJSClWizwdpqqXidmP:WfsGLP+z/M2YQs88Wpek26qdJSC8zdMQ
Malware Config
Extracted
laplas
194.87.216.44
-
api_key
78a51faf154353b4ff80910568eebfcad84a2c21884e8e575d7e536b57a06b32
Signatures
-
Laplas family
-
Executes dropped EXE 1 IoCs
pid Process 1504 XFlgWNZsQh.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2136 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe 1504 XFlgWNZsQh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XFlgWNZsQh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4192 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2136 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 1504 XFlgWNZsQh.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4612 2136 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 82 PID 2136 wrote to memory of 4612 2136 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 82 PID 2136 wrote to memory of 4612 2136 JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe 82 PID 4612 wrote to memory of 4192 4612 cmd.exe 84 PID 4612 wrote to memory of 4192 4612 cmd.exe 84 PID 4612 wrote to memory of 4192 4612 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_48ad9f289de82a58b3b390f4b6b1efe6e756e2a2ff885330bc67be387c924e82.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn cvAYqJhxHe /tr C:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn cvAYqJhxHe /tr C:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4192
-
-
-
C:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exeC:\Users\Admin\AppData\Roaming\cvAYqJhxHe\XFlgWNZsQh.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1504