Analysis
-
max time kernel
150s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe
-
Size
652.4MB
-
MD5
854c81ac5564234495f97f99352c4874
-
SHA1
e0423bfc8f6eda38703275bf59f7c53d28196bed
-
SHA256
5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af
-
SHA512
f6d5aacfc51982e809709f4dac98309940f45aad235be92e74dfcf87b80c7dc5d0b6f5d08af920b33722a0052ae7502e3da2b460692e663e7cfb63ae3870b804
-
SSDEEP
49152:2WhTeD8k0uh22L2BVsjlS88GTuaayup8jBT67o0+WGpTC67:2WhTeAAhcBCs88jyuuBCob1C67
Malware Config
Extracted
laplas
clipper.guru
-
api_key
b5f27c37558531cf78bce8922773aaa833cdccae51258e138ceb788888acb88d
Signatures
-
Laplas family
-
Executes dropped EXE 1 IoCs
pid Process 2080 GxDvSBcXEn.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GxDvSBcXEn.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2836 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 2080 GxDvSBcXEn.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2868 2752 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 30 PID 2752 wrote to memory of 2868 2752 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 30 PID 2752 wrote to memory of 2868 2752 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 30 PID 2752 wrote to memory of 2868 2752 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 30 PID 2868 wrote to memory of 2836 2868 cmd.exe 32 PID 2868 wrote to memory of 2836 2868 cmd.exe 32 PID 2868 wrote to memory of 2836 2868 cmd.exe 32 PID 2868 wrote to memory of 2836 2868 cmd.exe 32 PID 2608 wrote to memory of 2080 2608 taskeng.exe 34 PID 2608 wrote to memory of 2080 2608 taskeng.exe 34 PID 2608 wrote to memory of 2080 2608 taskeng.exe 34 PID 2608 wrote to memory of 2080 2608 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn eWnswambfo /tr C:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn eWnswambfo /tr C:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2836
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {189D5B59-E55A-4E31-9EFD-FA349D725C75} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exeC:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2080
-