Overview
overview
7Static
static
3ed221e0369...18.exe
windows7-x64
7ed221e0369...18.exe
windows10-2004-x64
7torrent.exe
windows7-x64
7torrent.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3gunzip.exe
windows7-x64
1gunzip.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
torrent.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
torrent.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240319-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
gunzip.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
gunzip.exe
Resource
win10v2004-20231215-en
General
-
Target
ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe
-
Size
174KB
-
MD5
ed221e0369355f19d8fc57979f7d87e2
-
SHA1
2d19de108865c20deb1a9438e578450fa74ec301
-
SHA256
2780a90c80e7f3a8251992d17cb57c76545ce87c0923022972259b88ef4e0448
-
SHA512
5362242d056fc1a19f61a6575d5296ae7c45be41ecb5dc1d412a57808b8e543ee3e75f6553680da682890f3e181f13caec1579898f921abc65b7231529db230f
-
SSDEEP
3072:IgXdZt9P6D3XJJCsKW/nAbbn0l7gjDFZxJGXmKZv/D+O9o4sAJkpDUZ7VkwBRZSd:Ie346sKW/nkb0l7gH2Rv/ykQDGhk6RZs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 764 torrent.exe -
Loads dropped DLL 6 IoCs
pid Process 2172 ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe 764 torrent.exe 764 torrent.exe 764 torrent.exe 764 torrent.exe 764 torrent.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\intellidownload\torrent.exe ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe File created C:\Program Files (x86)\intellidownload\header3.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\next.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\installid torrent.exe File created C:\Program Files (x86)\intellidownload\status torrent.exe File created C:\Program Files (x86)\intellidownload\gunzip.exe torrent.exe File created C:\Program Files (x86)\intellidownload\header.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\header2.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\skip.bmp torrent.exe File created C:\Program Files (x86)\intellidownload\cc torrent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00080000000122cd-1.dat nsis_installer_1 behavioral1/files/0x00080000000122cd-1.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 764 2172 ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe 28 PID 2172 wrote to memory of 764 2172 ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe 28 PID 2172 wrote to memory of 764 2172 ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe 28 PID 2172 wrote to memory of 764 2172 ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed221e0369355f19d8fc57979f7d87e2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\intellidownload\torrent.exe"C:\Program Files (x86)\intellidownload\torrent.exe" "/name=YVM_Daphne_9yo_D04_Fast" "/publisher=1021" "/sub=" "/search=YVM_Daphne_9yo_D04_Fast" "/type=search" "/tag=6"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665B
MD53cf99b5d78c31bf81cfac818221fba88
SHA1e8d27e0711c878b09cd1b2d7c391671dc6c6df73
SHA2566ee8c48032903a9b06189b74fdef1cb605ff51ae35aa37b37e041be49f8ed7b2
SHA51219422af6e983a1ad12597d48b8560ed355ac483d7297b87c6c410f6d335353285f40fea4fcbb0f3db4e90fbb9866b85fed3254e28b7804153a26571104c97940
-
Filesize
168KB
MD5c47c9ef0fdb670d0754e432522a94546
SHA1ec206bff65cc871491f5e11352ffe4a95854326a
SHA256be60730017da96fc5cc4a6a0e9c79c6ad0d2cea10876668592d337082bff30d5
SHA512a822f63500934d2562d5cf075c4c9267a6a5d8cec369317007647035a3eac297f1f9b37923775b75c520a2e6b53bce464499493861141af0c008774cee5c4d98
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e