Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240419-en
General
-
Target
167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe
-
Size
931KB
-
MD5
167c0f4885cb6d9fc13c967bfceeb939
-
SHA1
eae2bd8f375e9dcd93715c6e80e5dbf9d7604a36
-
SHA256
a7fcf790b59ef1cfc8dec3655474f90cdb41a8fea6d9ae9cf0d2d8703144714a
-
SHA512
89654a104dd5c482f86503e26bb0c0df71d817643c32d3b39bc8c14a88145a6291dca67daaea1acd7e8966f64afc3eebedf6c9da12f21cda3fdd69a08ec4bb5c
-
SSDEEP
24576:ntg0NmSRwZ/3WubQ41c0pGxCjpTM7+2vWc+Yt08:nxs6e3WH41/pGxYm7UcpN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2616 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 28 PID 1400 wrote to memory of 2616 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 28 PID 1400 wrote to memory of 2616 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 28 PID 1400 wrote to memory of 2616 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 28 PID 1400 wrote to memory of 2616 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 28 PID 1400 wrote to memory of 2616 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 28 PID 1400 wrote to memory of 2616 1400 167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 28 PID 2616 wrote to memory of 892 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 32 PID 2616 wrote to memory of 892 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 32 PID 2616 wrote to memory of 892 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 32 PID 2616 wrote to memory of 892 2616 internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\nsd8D05.tmp\internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsd8D05.tmp\internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsd8D05.tmp/fallbackfiles/'2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\8449.bat" "C:\Users\Admin\AppData\Local\Temp\0ECC11B502174C73AA64D60A8FF285C5\""3⤵PID:892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD54ad8f5e4185ab94a79a2e01c6b3cfd30
SHA18854ccda504e9b2453094d5b16edb3680db58860
SHA2569a93acd127cb8128cfa75de0627820aa196e0026c21b8ca624aea94281e7765b
SHA5121d5603c7858ca42bb31cf42185a9a0a5fed4f16c2310046d0d8f0c2babc8840574862ebb4c17243fcfd6d475c7f1ac739886cac9e981364bd213b441ffc672a4
-
Filesize
544B
MD561eeb4826a6765185cfe96ab9196674d
SHA17246e526a6bbb1f646006ade93432da9b2f11e29
SHA2562f567b742baef0158d7fd168eee4c07b191ab5b9e4ead7417379f89b0aa0944b
SHA51240abd952a8176eb8d583f9b6d7c45a5e75e0b1dbfd8020ec6a5b3e5c2094c9dd6a8bbf0d679d994c0f10f8d72fad07158ed87f7377dfe616bedf982a055647ab
-
C:\Users\Admin\AppData\Local\Temp\0ECC11B502174C73AA64D60A8FF285C5\0ECC11B502174C73AA64D60A8FF285C5_LogFile.txt
Filesize9KB
MD51a0c7b32bcf3a41eb044f6e2d4696b69
SHA1a22e3add1de9e35f4cfb02d73559344a36dc6534
SHA256854ef3712cbfcfac39a7fdb7596e7891d1cd71cf135eddc92d74fbe6bd9eaf7f
SHA512b4b5b5efddc76666dd538957f97b0f5b2be4d94be2b78add89a81659097e32dcd035cb797ace770dfd640e99e40bf2fc94aa53c055213aed03c7703855ceae15
-
Filesize
109KB
MD50d585ef42a091727295a59f0a684f100
SHA124c8bb172154a16ee70cb998fd84e0699eb58fe3
SHA256e75cd0d6e149fc43c3bb3bff58d6742a7d995dd5763f5516d331dbc31f70fa6a
SHA512d155be0b3d9eab17eae4885bddabac46fb4b9cc9688b77682dfe8ac252433b972aef324eda10d221fc117d809270a6bf50afcd630471815dfa8d94806647a6f6
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\nsd8D05.tmp\internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118_icon.ico
Filesize31KB
MD549423adffcdebeebd07c5685043a2de5
SHA1250c7979deebd09963172460d88081ae8a094552
SHA256a173c1085b8f2227909c0980a4aa6611670eba7869a34228d011019a5675b089
SHA51232d18c09cb21d9755a68e1d6d75dda8fb4ad297b3d6359765a56856f1a0f6fed47532ecec039b016c73a2967e62d44606415610ae42cec77ae815b164a7f5dfb
-
C:\Users\Admin\AppData\Local\Temp\nsd8D05.tmp\internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118_splash.png
Filesize143KB
MD5376138929342a1d86d97c9382da9cdd3
SHA1d9344a3797e105214357b575d22ab7565bf0aa9b
SHA256b50608c3355c6dacd183da40af82d87fbd41c6af8074617266c237416055bb7c
SHA51235fb73515970d257b682c50bff6b6cadedd79906e212c3ab80835f03de9602fecc29459d205c497b26fbf86a625de005d1f6f98117d9c17ccb1926cd39ff756c
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
\Users\Admin\AppData\Local\Temp\nsd8D05.tmp\internal167c0f4885cb6d9fc13c967bfceeb939_JaffaCakes118.exe
Filesize1.8MB
MD5e35e058dd2119eb0f0e852f8738fbab5
SHA1b7f9388398a9643eddb97a6c2ebaf28b6189c9a8
SHA25617158e4838c580edce7f87e677531324579734a5ffbabefac8ce038030f11556
SHA512d42ec1b3875e5a5cb23e520c2633081304d61ea282407dbb52d4b8c58bee4ccec377e291b485d6e6f5490920838c4b520fcd029897c6be4ac5da3bf19e46ac2c