Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad
Resource
win10v2004-20231215-en
General
-
Target
eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad
-
Size
132KB
-
MD5
eb2be0942c9f7ddf0c758399dcbf2aed
-
SHA1
f7892efe848c5b98595a4e8f98182f313bad607e
-
SHA256
8e8617a1701e445cf07f2695f3617ce856f5c16723d41493aabde876c5daf592
-
SHA512
92271e2ba76b805d12111609feac4fd0fbab613ab5c038913897a0f4623623f306c629d2c8b35805aa3d51b33478527ef129acad7a24f2dff7f4f6c041c980e6
-
SSDEEP
3072:6uVKH6pVBLlxtGrR7VgjAU6vhP8he7aS9N:9KH6pP4sjAptEe7aC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2168 1636 cmd.exe 29 PID 1636 wrote to memory of 2168 1636 cmd.exe 29 PID 1636 wrote to memory of 2168 1636 cmd.exe 29 PID 2168 wrote to memory of 2692 2168 rundll32.exe 30 PID 2168 wrote to memory of 2692 2168 rundll32.exe 30 PID 2168 wrote to memory of 2692 2168 rundll32.exe 30 PID 2168 wrote to memory of 2692 2168 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eb2be0942c9f7ddf0c758399dcbf2aed_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d30474cde1915fa40baf8f20b5a0dc32
SHA148b73fa1e5846b1c7c3808d2495c834b58175d31
SHA25661bd8398d9fd70c028ad35c8f8cf8de8a1f6facc716f397f7e68690b3aa06e8c
SHA512de6c23332e98e01ca0b07f66bbdb4be5131da05371c2a51b061612eed1a3563473bcf842436aa020470a060dfb0313014d4215750658458f1a0658cefc419474