Overview
overview
7Static
static
7f44b243799...18.exe
windows7-x64
7f44b243799...18.exe
windows10-2004-x64
7$TEMP/max9keygen.exe
windows7-x64
1$TEMP/max9keygen.exe
windows10-2004-x64
1$TEMP/svchost.exe
windows7-x64
7$TEMP/svchost.exe
windows10-2004-x64
7$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3messenger.exe
windows7-x64
3messenger.exe
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 20:46
Behavioral task
behavioral1
Sample
f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$TEMP/max9keygen.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$TEMP/max9keygen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/svchost.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/svchost.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240319-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/md5dll.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
messenger.exe
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
messenger.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/md5dll.dll
Resource
win10v2004-20240412-en
General
-
Target
f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe
-
Size
322KB
-
MD5
f44b243799cc58c5a8a5098a50993b5b
-
SHA1
024361d912ce8f6e24b0988d4bc6e522dba32770
-
SHA256
57d4f650bfce31b9ae59803b8eda8d31155ba36cab49e52c33078691bf9682a3
-
SHA512
ceae8a16fe35a6786d3b024b253b381c676099dba562c9ce90fdb8901ed50ac180e9d002a86812d08c0b8bcc7e5c715e4eff018bcc1f82bfbd14339cbf93a99d
-
SSDEEP
6144:S9k1/S4w8e34Pl7UyZtnl72LiMNCUyZtnDtm76xkv:ck1/SPiljtnl4igwtnDg76W
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2268 svchost.exe 1576 max9keygen.exe -
Loads dropped DLL 7 IoCs
pid Process 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe 2268 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\messenger.exe = "C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\Web Components\\messenger.exe" svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\Web Components\messenger.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Web Components\messenger.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x00090000000233eb-4.dat nsis_installer_1 behavioral2/files/0x00090000000233eb-4.dat nsis_installer_2 behavioral2/files/0x00080000000233ee-13.dat nsis_installer_1 behavioral2/files/0x00080000000233ee-13.dat nsis_installer_2 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3568 wrote to memory of 2268 3568 f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe 86 PID 3568 wrote to memory of 2268 3568 f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe 86 PID 3568 wrote to memory of 2268 3568 f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe 86 PID 3568 wrote to memory of 1576 3568 f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe 87 PID 3568 wrote to memory of 1576 3568 f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe 87 PID 3568 wrote to memory of 1576 3568 f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\max9keygen.exeC:\Users\Admin\AppData\Local\Temp\max9keygen.exe2⤵
- Executes dropped EXE
PID:1576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5236e0270cee6f33ffdfaf2489341521c
SHA19a3f590e2546a4322ab43c1b84a045733f9a7b43
SHA256e7f4a36acfda6821b334e9148a83864b782a66d75d5a99f8a95163c5da5efabc
SHA5120cf3d4ca86785f284c962392fbd691bfe95c11e1fcffb0f9fc1298780d5e947af2979aa4b64388bfedd8768fdf82720226dea1e93e2a73e1ff652f08f0473726
-
Filesize
19KB
MD514b848866035dea39b912da628307231
SHA1d00c8963aee8038d8a22f098cef69b31007196e5
SHA2566a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc
SHA5124538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
168KB
MD5a589909b706cb56ed100b34cd1eaba8f
SHA162f691d8ee9e68eb9ec4b1f5f81d2ac6d2329224
SHA25653ad4387cc26ef8669004e1599b06a88218a47b8d627027466f73fb0aa891a88
SHA51271df9e55e6eca7adea93abcc013ed1bd13e804cf54cb48f75da7ee162ad0331af7c86b658ed8a9f09b42ca55d14c29185ec8478424be31596c8a95fc8a268f31
-
Filesize
91KB
MD572a6d43a220aff3e2c3afc7ee86f5cad
SHA15869f365812f998a71b35a75cc6ac992d964c535
SHA2562ab5a4918151220fe90dac7309173248d01cd3d2ab4dbe1712049588a0aa5cd8
SHA5122057fceb499730dbdb5707505154180c41f0a8086ce1734f2da785a393a19875594065cdf823c0120314b924a1dd11b96195f068069e6b21f33ea74f59005767