Analysis
-
max time kernel
152s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe
-
Size
652.4MB
-
MD5
854c81ac5564234495f97f99352c4874
-
SHA1
e0423bfc8f6eda38703275bf59f7c53d28196bed
-
SHA256
5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af
-
SHA512
f6d5aacfc51982e809709f4dac98309940f45aad235be92e74dfcf87b80c7dc5d0b6f5d08af920b33722a0052ae7502e3da2b460692e663e7cfb63ae3870b804
-
SSDEEP
49152:2WhTeD8k0uh22L2BVsjlS88GTuaayup8jBT67o0+WGpTC67:2WhTeAAhcBCs88jyuuBCob1C67
Malware Config
Extracted
laplas
clipper.guru
-
api_key
b5f27c37558531cf78bce8922773aaa833cdccae51258e138ceb788888acb88d
Signatures
-
Laplas family
-
Executes dropped EXE 1 IoCs
pid Process 2740 GxDvSBcXEn.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GxDvSBcXEn.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4444 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 2740 GxDvSBcXEn.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3920 2476 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 83 PID 2476 wrote to memory of 3920 2476 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 83 PID 2476 wrote to memory of 3920 2476 JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe 83 PID 3920 wrote to memory of 4444 3920 cmd.exe 85 PID 3920 wrote to memory of 4444 3920 cmd.exe 85 PID 3920 wrote to memory of 4444 3920 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c621f82d8a4230e0a3c5f7ea2ade089cb6833b8e79e9ac98282ad404e32e0af.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn eWnswambfo /tr C:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn eWnswambfo /tr C:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4444
-
-
-
C:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exeC:\Users\Admin\AppData\Roaming\eWnswambfo\GxDvSBcXEn.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2740