Overview
overview
7Static
static
3257855b2b6...18.exe
windows7-x64
7257855b2b6...18.exe
windows10-2004-x64
7$1/$APPDAT...er.exe
windows7-x64
7$1/$APPDAT...er.exe
windows10-2004-x64
7$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$1/MediaPl...on.exe
windows7-x64
1$1/MediaPl...on.exe
windows10-2004-x64
1$1/MediaPl...ff.exe
windows7-x64
1$1/MediaPl...ff.exe
windows10-2004-x64
1$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$R1/mplayerc.exe
windows7-x64
1$R1/mplayerc.exe
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$1/$APPDATA/MediaPlayerApplication2/uninstaller.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$1/$APPDATA/MediaPlayerApplication2/uninstaller.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$1/MediaPlayerApplication.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$1/MediaPlayerApplication.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$1/MediaPlayerInstallerStuff.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$1/MediaPlayerInstallerStuff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$R1/mplayerc.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$R1/mplayerc.exe
Resource
win10v2004-20240508-en
General
-
Target
257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
257855b2b6a8dbfd1cb0c5d486d11e2b
-
SHA1
6d7740766a5de86df001a39bce82b313de1eaef4
-
SHA256
aef46a1721c206f840f4dc420b17eb703e80ee3276e0cd73834123e14a013397
-
SHA512
12c1d3d75ce086f0ca8ed34c3b1a7cf172cb950007172d9ae53c8234de226be04f29301d1f34ac204ec8cfb9031141b66ac31a31101cdf342dbb1201ddb71e6a
-
SSDEEP
49152:dgWFAS1CetCGJTt2MOSzSAUXMQU2NjXJw0FmWYSx4SJvJ7ZRLeduX:Xt1T9t2MOSfmMLWjXJw0FmWYQvJtgduX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2056 MediaPlayerInstallerStuff.exe 2396 MediaPlayerApplication.exe -
Loads dropped DLL 4 IoCs
pid Process 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2056 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2056 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2056 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2056 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2056 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2056 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2056 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 28 PID 3008 wrote to memory of 2396 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 29 PID 3008 wrote to memory of 2396 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 29 PID 3008 wrote to memory of 2396 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 29 PID 3008 wrote to memory of 2396 3008 257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\nsi22CD.tmp\MediaPlayerInstallerStuff.exe"C:\Users\Admin\AppData\Local\Temp\nsi22CD.tmp\MediaPlayerInstallerStuff.exe" "write_patch_str_to_reg" "C:\Users\Admin\AppData\Local\Temp\257855b2b6a8dbfd1cb0c5d486d11e2b_JaffaCakes118.exe" "HKCU" "Software\MediaPlayerApplication" "zerker"2⤵
- Executes dropped EXE
PID:2056
-
-
C:\Users\Admin\AppData\Roaming\MediaPlayerApplication2\MediaPlayerApplication.exeC:\Users\Admin\AppData\Roaming\MediaPlayerApplication2\MediaPlayerApplication.exe2⤵
- Executes dropped EXE
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD53cdc437ac9a03a6cca99d618cd397da4
SHA16a331756c30bb7777c2c7e6c07ca0562d7f500c8
SHA256de24fb81d20c2aacb66f419c6e523416cf61c5ea5de3af0e25ed4eb301f3a6f2
SHA5129aad7f0bdbe7d126b32fca359c3498888820edef9d23d866e5a481be877cd59e4da4944869ccd022581b332945ebecb9fb21d82cddf319a6480c722a23fc7015
-
Filesize
115KB
MD518226dce3f8a67d3ed65c2d1a9f3b348
SHA159e983233a0c9ae32348fed758b14ec29cb1f987
SHA256c748afc480f03f7e24b3eba8306ef108da235c39ee134a744363e2c22ed7afea
SHA51246a18c49829afa289795ca4dac85931d60d60a1e52238841ec288d18c802aa2be6f8b3f14130ea25f86c73c37f89875b9b6f4743dcb05959e83614ad1c8b3efd
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
4.2MB
MD5e379e2e71017a9c9dccc0745dcc93513
SHA1a22081f0620fc1c93c2816b8e87559eb962d6dc4
SHA256fe2bceb7f99dfc746c8f76aa9a3120ab6716cb17d356d5ef95f4fb84a69d8039
SHA512427d35ac0438ae1d70b16b5ba155070a23712b63858b8bf21a780af4201eef6ed6a9df3a1e6f7abb3ac4d24c7b75ba84c1b994f8837eee289a5a6b5c7799605f