Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
4fb4f76d876c4f5688bf4144a2989051_JaffaCakes118.jad
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4fb4f76d876c4f5688bf4144a2989051_JaffaCakes118.jad
Resource
win10v2004-20240226-en
General
-
Target
4fb4f76d876c4f5688bf4144a2989051_JaffaCakes118.jad
-
Size
70KB
-
MD5
4fb4f76d876c4f5688bf4144a2989051
-
SHA1
5dffd051fe679dece19fcec0ee230ceff88a237e
-
SHA256
22f033a03413ac82a885b2221bca40b8476c4cfc350dad81062e97b6fed85dd9
-
SHA512
02b0bdc0f8513c30e320b3681bc06984b30639ec49d183697f9a80828b50d425457756082f631f8bfc411434414f27c4b8525f992de3536068f2f99ba4ef9574
-
SSDEEP
1536:exY2pxBWG1vAxhEopCW8BK1M1dOVzEBseL5O:cVhYVYWAOSBsedO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2476 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2476 AcroRd32.exe 2476 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2576 1484 cmd.exe 29 PID 1484 wrote to memory of 2576 1484 cmd.exe 29 PID 1484 wrote to memory of 2576 1484 cmd.exe 29 PID 2576 wrote to memory of 2476 2576 rundll32.exe 30 PID 2576 wrote to memory of 2476 2576 rundll32.exe 30 PID 2576 wrote to memory of 2476 2576 rundll32.exe 30 PID 2576 wrote to memory of 2476 2576 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4fb4f76d876c4f5688bf4144a2989051_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\4fb4f76d876c4f5688bf4144a2989051_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4fb4f76d876c4f5688bf4144a2989051_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5741f048a21df33dddfdb9ffce78db122
SHA11dc911d5c2d8c0c3b072bde31172e1ce3f7471e1
SHA256ca92b0313f5cc05ba925c2cc894eafda48844c01cc7c68f5eddc9f2cd975961f
SHA512ec71ab64a03e8d060b896f92b82398095a5d82a0f2b634cc5d02d66ddc3d63242a727ad128b44d130169c2ffed9c6b7c5489aded921a203520369b8249ec643f