Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 08:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e250f97064d910406a502beed47328a8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e250f97064d910406a502beed47328a8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e250f97064d910406a502beed47328a8.exe
-
Size
74KB
-
MD5
e250f97064d910406a502beed47328a8
-
SHA1
79c035ea060b26dbe979fd19c5f258cfa25ad727
-
SHA256
29239885afb3e8d877d0e8148b96e29c3a90942eab23ad24d0292c4ae399a202
-
SHA512
cf4f50381de818f280a4fb08282e297eba07d12be29d1da7fcd6fec726fbd626e45209c26b692463b1447b383806d05827f2429a6df605a1892a24f0e8e6a9f3
-
SSDEEP
1536:J5GJEhlcbW5sk1BlfLvveIbXWm+nwN6JMDs5ggfs1mmqCpaqJTImu1kC:DGu9BlfzWIbXWm+w0JN5PscXCpvRu1kC
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3556 CL302_~1.EXE 1028 dsfs.exe 4828 CL302_~1.EXE 3616 dsfs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_e250f97064d910406a502beed47328a8.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\dsfs.exe CL302_~1.EXE File created C:\Windows\dsfs.exe CL302_~1.EXE File opened for modification C:\Windows\dsfs.exe CL302_~1.EXE File created C:\Windows\dsfs.exe CL302_~1.EXE -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsfs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e250f97064d910406a502beed47328a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CL302_~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CL302_~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3556 3260 JaffaCakes118_e250f97064d910406a502beed47328a8.exe 82 PID 3260 wrote to memory of 3556 3260 JaffaCakes118_e250f97064d910406a502beed47328a8.exe 82 PID 3260 wrote to memory of 3556 3260 JaffaCakes118_e250f97064d910406a502beed47328a8.exe 82 PID 3260 wrote to memory of 4828 3260 JaffaCakes118_e250f97064d910406a502beed47328a8.exe 84 PID 3260 wrote to memory of 4828 3260 JaffaCakes118_e250f97064d910406a502beed47328a8.exe 84 PID 3260 wrote to memory of 4828 3260 JaffaCakes118_e250f97064d910406a502beed47328a8.exe 84 PID 4828 wrote to memory of 2356 4828 CL302_~1.EXE 85 PID 4828 wrote to memory of 2356 4828 CL302_~1.EXE 85 PID 4828 wrote to memory of 2356 4828 CL302_~1.EXE 85 PID 1028 wrote to memory of 3616 1028 dsfs.exe 87 PID 1028 wrote to memory of 3616 1028 dsfs.exe 87 PID 1028 wrote to memory of 3616 1028 dsfs.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e250f97064d910406a502beed47328a8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e250f97064d910406a502beed47328a8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CL302_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CL302_~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CL302_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CL302_~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CL302_~1.EXE3⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
C:\Windows\dsfs.exeC:\Windows\dsfs.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\dsfs.exeC:\Windows\dsfs.exe2⤵
- Executes dropped EXE
PID:3616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5f1535af069fd54edb89d92c2956291c9
SHA1ab2e3c68e9b94b7f706ae2956347dd51c97578e9
SHA256a9c98754f0f2c27ffb80f8478adce58db43246b3376a72606f4d391de1817def
SHA512bad85f3a5ca2bf4471a96e3fb4e09d9473db17a3f517ebe52e611f8e19c0e4920287cbe46a5c686e1b62e9bec3c03777a87efdacdc32dbcabd92f499e2b7553a
-
Filesize
9KB
MD575bd88c0c39ac70d16d1cc24ca186084
SHA17416412bc0a57396d361840d2d4d05495ceac0c3
SHA256c019fa658e1f5e12eea6e280cd227d075b9c19e78961d104fff2c822f28251b5
SHA5120bfc0f5a39e9f21d330d6741860735918e2677d035c572174ed39b9792fcef71d8a7c2be832223e890f2bbd70e9c6e3946a67b47526722a0e8a5ed9ede653cca
-
Filesize
66B
MD5da47fca6b0d08f8da640dbf5a150d927
SHA14816d153ea8c75d04e4fdaa94a001bd8be93b124
SHA25646966467d87524c4aa74bc0b93620c309198967d8f7ea06c3c47243efadb989a
SHA5124c4ba7b0350969a2d899d587f33b1fb189479d16860bb2a3533aeaf0a2f43c73b0b85fa9fed6ce06cbfb701d332990843472d72bdd1610ae680f947da9f38c92