Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad
Resource
win10v2004-20240412-en
General
-
Target
fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad
-
Size
68KB
-
MD5
fb1a1cbe5c8e18e282f58893408eac01
-
SHA1
078c3d4f2863fec55fe56b5899a4124aba1e05aa
-
SHA256
46fe1ecb4f3023cb7786d7760be277f01f4662c0ed2accedecf322de9a8b6e79
-
SHA512
ff139b53ccdee1e673e46845581a2989b33121e6840030f67a0eba4e248008fa61033cb078301956716c6127cd904187b24fd9905ea02aad0dad281ee9c7ddb8
-
SSDEEP
1536:EjUcFC+MEcfswy7GtW2insgvrGoZNGtW2insgvrGoZY:EjUctofA7ZsArG8ZsArGL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\jad_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 AcroRd32.exe 2572 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2616 2996 cmd.exe 29 PID 2996 wrote to memory of 2616 2996 cmd.exe 29 PID 2996 wrote to memory of 2616 2996 cmd.exe 29 PID 2616 wrote to memory of 2572 2616 rundll32.exe 30 PID 2616 wrote to memory of 2572 2616 rundll32.exe 30 PID 2616 wrote to memory of 2572 2616 rundll32.exe 30 PID 2616 wrote to memory of 2572 2616 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fb1a1cbe5c8e18e282f58893408eac01_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD575fb78960d3fb64ffcfb8c6d70767946
SHA1ae7958fd43b3d4bf3457f8d75f4c3f0141330a51
SHA256bbe4f6fe4932da5b20a7182713c5ece948120ca7b07ad2650f9128a21c862885
SHA5121c355c5f3c530d058c0fa732e0b933a9d54069462f63872beed1df0a14ec5f447a0666e9112d2e989ad5d57398906e654625414d63516bf63d63748883a1f40d