Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 06:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe
-
Size
387KB
-
MD5
4ff3ef6b696bc4d00a134f153182f8cb
-
SHA1
a73170476d633cb97cda0851401f2e88bd34a77b
-
SHA256
26ac6522c2d76489f05bd905f4758e945a01e51e60e4dcbc5477f61e59925144
-
SHA512
9ab6529f8f61efba11512b6a5975fc2946f03860d5bc73b008a1ccf1281e5e0d10893595835837942d3db810bb4654ab2dcf0515da03167b35da10d66e4e3845
-
SSDEEP
6144:H+r46Fh3HEHcHtUNUuD3/coMpHjMtZLlAlkZehyO5WCEq2EKp:LqccHtUNU43/p2DMnLlACehxEqo
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3560 d04b0559.exe 1444 910391bd.exe 2708 44bdc883.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 rundll32.exe 4384 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Axekesogologiwab = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Wigapin.dll\",Startup" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2304 2708 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 910391bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d04b0559.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44bdc883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1444 910391bd.exe 2228 rundll32.exe 4384 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1212 wrote to memory of 3560 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 82 PID 1212 wrote to memory of 3560 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 82 PID 1212 wrote to memory of 3560 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 82 PID 1212 wrote to memory of 1444 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 83 PID 1212 wrote to memory of 1444 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 83 PID 1212 wrote to memory of 1444 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 83 PID 1212 wrote to memory of 2708 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 84 PID 1212 wrote to memory of 2708 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 84 PID 1212 wrote to memory of 2708 1212 JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe 84 PID 1444 wrote to memory of 2228 1444 910391bd.exe 86 PID 1444 wrote to memory of 2228 1444 910391bd.exe 86 PID 1444 wrote to memory of 2228 1444 910391bd.exe 86 PID 2228 wrote to memory of 4384 2228 rundll32.exe 97 PID 2228 wrote to memory of 4384 2228 rundll32.exe 97 PID 2228 wrote to memory of 4384 2228 rundll32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4ff3ef6b696bc4d00a134f153182f8cb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\d04b0559.exeC:\Users\Admin\AppData\Local\Temp\d04b0559.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\910391bd.exeC:\Users\Admin\AppData\Local\Temp\910391bd.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wigapin.dll",Startup3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wigapin.dll",iep4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44bdc883.exeC:\Users\Admin\AppData\Local\Temp\44bdc883.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 3843⤵
- Program crash
PID:2304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2708 -ip 27081⤵PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD5d7b4181b27e3c49fe004e269729b64ab
SHA146009d16834c399a1ba6d401150d25f1b630fafd
SHA256c121ef0915388809056150fa9542e3c61c4dbba4177b53e2704f922535f47013
SHA5125a1f3149a3b3cc5f8bc8d9ce3111ac4e4fcbcd14ce8cc8a7cff34aec5c5fd489e1878ef2a39a093964566330373362eaec7326d6a82d4dc427740275dd101e7c
-
Filesize
112KB
MD53ca26258ccf37f6144e78d2fe06dff8e
SHA11d34534ccdc271d07b36c1d810517dd6c20568d6
SHA256ae177b7b6ed91a117eb452dc705dcc0fefc65b361cfa08ece0bfc0d185f89a96
SHA512965039266b6aa45f953ea4515b4d8344b9a8277ea9717aa167ce0bf0cd19ae0dab25b6a25c6abb065f45c2c25bcff6278f3708d96414a7c7a3de4a20dbc6459a
-
Filesize
52KB
MD503a0c199e8d5b1b2c143a4e2f4d4926d
SHA13b2bac2ea10faf6e67d477a797c58879d3e2b229
SHA25685252f50292b5f6974099b02674c7bafa3cd7403e70f94cf457bd7167b99c172
SHA51254f91ef41fffa2dd33697206f085a411035f8c4421f4574af8e53a65311427fac9d28c0c015f820dec0b7c9ca842d970632ff0537faa7914fb1f40c26e798c6f
-
Filesize
112KB
MD5ac2d37da5ee9c3c94e026538ebbc64ca
SHA127a2153e9a645cf2ea7cbaa9d90e4daea2f76ffc
SHA256ef1a951c9840e57ca1fd4823accaa66fc124df61d2897413d6f83970f3f56678
SHA512def7437d93346eaba75f0d8b84d46d4e912021448bea94425ad1f684bfefa32337bc139f8d378b3347440762d346f9fee3a0d252432d5983006d21bf545edcb5