Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe
-
Size
486KB
-
MD5
0a22016e26a3e9175ae5fb31a50fd993
-
SHA1
0105e1c499f06cf96e06b445a197b1e0b59b94f3
-
SHA256
a4fe35c4679468bef0e318c98fe528f008e90829161144926c6bc6af40b357b2
-
SHA512
205ad4bf44353ef5eaa704b011baa862499ca826933359cc793bf4bdeb4974d1992c9386d83ba879cffdbcb0dfd8eae6320518ef15272dbef6b101a6e8b13aa7
-
SSDEEP
12288:frF2600C97Ap55ucNdszxTYZRMX00JeUg:fro6s9u5IcNdM5vMB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2344 8B2F.tmp -
Loads dropped DLL 1 IoCs
pid Process 2192 0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2744 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2344 8B2F.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE 2744 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2344 2192 0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe 28 PID 2192 wrote to memory of 2344 2192 0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe 28 PID 2192 wrote to memory of 2344 2192 0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe 28 PID 2192 wrote to memory of 2344 2192 0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe 28 PID 2344 wrote to memory of 2744 2344 8B2F.tmp 29 PID 2344 wrote to memory of 2744 2344 8B2F.tmp 29 PID 2344 wrote to memory of 2744 2344 8B2F.tmp 29 PID 2344 wrote to memory of 2744 2344 8B2F.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\8B2F.tmp"C:\Users\Admin\AppData\Local\Temp\8B2F.tmp" --helpC:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.exe 98ED113BB0A8C0CB8C9887A81228611C08B1E89219A2D32E5E4582BDA2DD6D7B8A9E491B3B4FA292F76CF5EF5E1CC8AA55046986FBB778A29677EA60FF39AC0A2⤵
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0a22016e26a3e9175ae5fb31a50fd993_JaffaCakes118.docx"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5e90e498009a13ae957dcde4e01065e7d
SHA1dcb4cc9b7d1ed3becc625597422d60aaf068a759
SHA256ca91bbd477e2a516997c48dde3da1a5eae4cad86ca664fea54f0103739073c94
SHA5124d0868f653e6c57d4011430ab81688f4f039550a9a0b5b1ce5ab1a695cb1dca7d7cdfb1d7c3920c35bbd3a8b441c820f00ae4e71f749650545ddd6894d597766
-
Filesize
486KB
MD5cab7aecb6d462807b695037fbf04ec9d
SHA1f7fdc0b3b5bcb19a29b0372f63b9190abfd016f1
SHA2568220e59cd121dd3217c8763672f7b677bc618a1f46e0e877e53d6307058ffb7c
SHA5123a0c1338ab0f0357e6c0d0e05610d3f9f7d73904c814279100762f5a8df01c9f80e7eb48457cda97eab5b0d9fb5efc1cc847014321d976ec283633668e106ff6