Overview
overview
7Static
static
34cbd4eddf3...18.exe
windows7-x64
74cbd4eddf3...18.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...nd.dll
windows7-x64
3$PLUGINSDI...nd.dll
windows10-2004-x64
3$PLUGINSDI...in.dll
windows7-x64
1$PLUGINSDI...in.dll
windows10-2004-x64
1$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3K8Browser.exe
windows7-x64
6K8Browser.exe
windows10-2004-x64
6K8BugReport.exe
windows7-x64
1K8BugReport.exe
windows10-2004-x64
K8Common.dll
windows7-x64
3K8Common.dll
windows10-2004-x64
3K8DLPlatform.exe
windows7-x64
1K8DLPlatform.exe
windows10-2004-x64
1K8DLUtils.dll
windows7-x64
3K8DLUtils.dll
windows10-2004-x64
3K8Flash.exe
windows7-x64
6K8Flash.exe
windows10-2004-x64
7K8GM.exe
windows7-x64
6K8GM.exe
windows10-2004-x64
6K8UIRender.dll
windows7-x64
3K8UIRender.dll
windows10-2004-x64
3K8Update.exe
windows7-x64
6K8Update.exe
windows10-2004-x64
6Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/K8NsisMiniExtend.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/K8NsisMiniExtend.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/K8Skin.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/K8Skin.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NsisAdvance.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NsisAdvance.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
K8Browser.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
K8Browser.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
K8BugReport.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
K8BugReport.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
K8Common.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
K8Common.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
K8DLPlatform.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
K8DLPlatform.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
K8DLUtils.dll
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
K8DLUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
K8Flash.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
K8Flash.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
K8GM.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
K8GM.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
K8UIRender.dll
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
K8UIRender.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral31
Sample
K8Update.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
K8Update.exe
Resource
win10v2004-20240426-en
General
-
Target
4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe
-
Size
10.9MB
-
MD5
4cbd4eddf3a83b88ecbf1b16e3d96359
-
SHA1
16b29d43efbe1f1cffc3b29dc642380a442633c9
-
SHA256
2a3f928955893e6810408be597a7b15008d5b1999d1b70e3f7a73fcf8cddde58
-
SHA512
9601cd96aebcc3cc7474c9ec3edf10796ba887f5af0f2d894404ef102fb49409b0512efb372b3a35a1276aaaa3c00501fd1deabcb1db18d9350a5be1f4f0fba6
-
SSDEEP
196608:dV2RRVt/PJXkUoTDjencmbtMwDt1UQsMyOfolNqq7upWlig9bX+uenSAM69TdbOO:dMNt5B4DCnhjt1mMyJNmg9bXOnSA1BF5
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe 1204 4cbd4eddf3a83b88ecbf1b16e3d96359_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5da85f0f06cda668c88c1af4553358902
SHA17d95f6a00bcb30566b78293f7139f9eae1c788ab
SHA256a0746336fc1a8277a4af1758b39bc312ebf40c91ddad95aef40ec98b7699117d
SHA5120563e4d54a83d657406142c1a9837d03e16a48c5eae28ad3935f69a06ebd7d8d91364c97c11b788b071e05c7a87f840364c160b70dd2666b33e73aad3a7fc027
-
Filesize
420KB
MD5fc2ff34420233f05ef99aab1bfad9b21
SHA106ce9d74e0f489b96afc83a5287846fa9e4c36d2
SHA2566a2543f949265b3790fbb9e927c66e1797686c7ac9f6e981eb6c6944204870a1
SHA512c4b05e40d729534a44830bf3dad6d851d4ef9330699773747c44b03929cda993d363c196044ff6a713a0b4abe35e9945cd9d8becfb89f43ab38a590666f28773
-
Filesize
189KB
MD55f13f8cec9687ceda5ba5c86bf1c4ee1
SHA1c1c684ed53de077ef2d52286a22847f8c8cd0e96
SHA2563ec6a9f26c1f7327e36780c4520284a91c90f3042a0a8d749bd8c67bae78b6d7
SHA5124a53adfd60a84facb5c4dc82887a313ce5363143f8bdb80e4ca319a8c8978d331b08fee7becca3c88fdce1524e936fa1f6f08554a0788110e44384e1162d0d3c
-
Filesize
1.0MB
MD5a56090909a5dc6ca357132506f84cfaf
SHA1fda041aa38b44d95b2bd2a52c9943a68672bde3f
SHA256d3e912dbdee4b09e8bf7a3bce8a91bce8c2b47b2a378b49f1c764f20d84e66b1
SHA512e284fc3f9ab3b79e429725a8f23d2c43e6f4c96323054cf304e217a9cd2706913b4c95775b364cc0a55b9537197e179144106322625ef2ebb207fe25a7b65b21
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6