Overview
overview
7Static
static
1093ae388aa...18.exe
windows7-x64
7093ae388aa...18.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
1$PLUGINSDI...ls.dll
windows10-2004-x64
1$PLUGINSDI...ad.dll
windows7-x64
1$PLUGINSDI...ad.dll
windows10-2004-x64
1$PLUGINSDI...fo.dll
windows7-x64
1$PLUGINSDI...fo.dll
windows10-2004-x64
1$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/dl.dll
windows7-x64
1$PLUGINSDIR/dl.dll
windows10-2004-x64
1$PLUGINSDIR/hu.dll
windows7-x64
1$PLUGINSDIR/hu.dll
windows10-2004-x64
1$PLUGINSDI...ct.dll
windows7-x64
3$PLUGINSDI...ct.dll
windows10-2004-x64
3Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BDLogicUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BDLogicUtils.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BDMDownload.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BDMDownload.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/BDMNetGetInfo.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/BDMNetGetInfo.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/dl.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/dl.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/hu.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/hu.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/tmp1flsct.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/tmp1flsct.dll
Resource
win10v2004-20240419-en
General
-
Target
093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
093ae388aa995d138dc06120fbf8af37
-
SHA1
06842bee75476ba9deb4ed47dd880ae3224ce9b5
-
SHA256
a944aede510112b275795e1ed178f7f9ad3d1835239c8518ec38f4b7eb59d22f
-
SHA512
31f24e51c43d0adb63cd0f71a07393273bc711769dc02838a81132a26471a3f4d59a4aaa32dca1ea03b84008c800e0ce1be77bc689acdc86b733d3e6139c2e1b
-
SSDEEP
49152:kXdUu02MpdL1U3vDLk1tyeN8ENB+Kp7Gbk4SL3Ca58c:c2uyTL10bm5NLNB+OGoma5D
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 3020 093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe 3020 093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe 3020 093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe 3020 093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe 3020 093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3020 093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD512f98be1d919784370eb0f87e78b60d8
SHA1d07de2227b2ec68545be0adeb042af457d68f9e2
SHA25663e34375374ae6cc695c0bc03f1f9aad67e068fc51962fd25edbf2fbeceda9f9
SHA512ab2fcdd3eb7b58f044a855b5cae744bc1b3be599cf0d22ee93ccce2e97cb3bc1f36ea2c1ed75013c76f8c9e4071ba29710595c3a57cda2470885ee9293fc2d8d
-
Filesize
1.3MB
MD539257175ac9c90199c69aea1a7bcbda0
SHA16cf4a8dedf37d24ce902f34fa66120a214e1a2cc
SHA25684d5fb0a7cf1bc1e4bbd0de51d3b7eb04bb92af9a1fc3675601b382a5f11d9fc
SHA5124a71d0ac3df53b25509205e9ed0bf781cbefa2ba6307501ae336488c8a3f7f627b8d01f861adbf47986e168abab5a06b36848f87cbcf27fe846e5f0ffc3a9f53
-
Filesize
18KB
MD51c951bbcbc780046d6be1079a04870a4
SHA1a5bae7d838973154e6fac69b1c5ff7d2cda01906
SHA256d23676fbcf76355d1af68e7b32964b837243349920921b2ec74d97554809a65e
SHA51262c3686baed2232f7d8ddc8f48a41761812b5b2a67f3a689b7a43275f077842366abc13c7e8259613bfd9df25cf467e4001337c1454aec910abce121d551e2d8
-
Filesize
2.6MB
MD5e6f399b01f56188ecb0ac79d39989bf9
SHA1d4e4a1ff7ec6558f03a2ba19c06f6c5e7471691b
SHA256aebf600d0056c2a0aab6e7b12ab6cbdb6a990edca79f602cd8bd042c0b73ab1c
SHA512e28b582e0f697b873a6d4363af050364db94a7fbcd28d8cb09c2f14feaa9cd727c4947cfd5c4daa0065c3543d530156f30133db4dfab63b55c741f155337e59b