Overview
overview
7Static
static
35df608136c...18.exe
windows7-x64
75df608136c...18.exe
windows10-2004-x64
7$1/$APPDAT...er.exe
windows7-x64
7$1/$APPDAT...er.exe
windows10-2004-x64
7$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$1/MediaPl...on.exe
windows7-x64
1$1/MediaPl...on.exe
windows10-2004-x64
1$1/MediaPl...ff.exe
windows7-x64
1$1/MediaPl...ff.exe
windows10-2004-x64
1$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$R1/mplayerc.exe
windows7-x64
1$R1/mplayerc.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$1/$APPDATA/MediaPlayerApplication2/uninstaller.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$1/$APPDATA/MediaPlayerApplication2/uninstaller.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$1/MediaPlayerApplication.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$1/MediaPlayerApplication.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$1/MediaPlayerInstallerStuff.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$1/MediaPlayerInstallerStuff.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$R1/mplayerc.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$R1/mplayerc.exe
Resource
win10v2004-20240426-en
General
-
Target
5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
5df608136c0c1a4f16f7345d29ac0d68
-
SHA1
016afa9860b4f2f5e010eda0df9e02214e21a00f
-
SHA256
6a996d6344f2f87b842b1c7f454501dcb6b4d4bb37cba95ffc213f2579e345a9
-
SHA512
00f648f10ebeee347033f3442309f3412e360d2ab6be08e8e4652f1226f493f5e67f43f417e58b796308797ba9c0e944701591be8d65cd5abd50ca286de571de
-
SSDEEP
49152:dgWFAS1CetCGJTt2MOSzSAUXMQU2NjXJw0FmWYSx4SJvJ7ZRLedua:Xt1T9t2MOSfmMLWjXJw0FmWYQvJtgdua
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2368 MediaPlayerInstallerStuff.exe 2984 MediaPlayerApplication.exe -
Loads dropped DLL 4 IoCs
pid Process 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2676 2984 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2368 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2368 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2368 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2368 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2368 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2368 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2368 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2984 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 29 PID 2860 wrote to memory of 2984 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 29 PID 2860 wrote to memory of 2984 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 29 PID 2860 wrote to memory of 2984 2860 5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\nsd1CE4.tmp\MediaPlayerInstallerStuff.exe"C:\Users\Admin\AppData\Local\Temp\nsd1CE4.tmp\MediaPlayerInstallerStuff.exe" "write_patch_str_to_reg" "C:\Users\Admin\AppData\Local\Temp\5df608136c0c1a4f16f7345d29ac0d68_JaffaCakes118.exe" "HKCU" "Software\MediaPlayerApplication" "zerker"2⤵
- Executes dropped EXE
PID:2368
-
-
C:\Users\Admin\AppData\Roaming\MediaPlayerApplication2\MediaPlayerApplication.exeC:\Users\Admin\AppData\Roaming\MediaPlayerApplication2\MediaPlayerApplication.exe2⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 1283⤵
- Program crash
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
115KB
MD518226dce3f8a67d3ed65c2d1a9f3b348
SHA159e983233a0c9ae32348fed758b14ec29cb1f987
SHA256c748afc480f03f7e24b3eba8306ef108da235c39ee134a744363e2c22ed7afea
SHA51246a18c49829afa289795ca4dac85931d60d60a1e52238841ec288d18c802aa2be6f8b3f14130ea25f86c73c37f89875b9b6f4743dcb05959e83614ad1c8b3efd
-
Filesize
170KB
MD53cdc437ac9a03a6cca99d618cd397da4
SHA16a331756c30bb7777c2c7e6c07ca0562d7f500c8
SHA256de24fb81d20c2aacb66f419c6e523416cf61c5ea5de3af0e25ed4eb301f3a6f2
SHA5129aad7f0bdbe7d126b32fca359c3498888820edef9d23d866e5a481be877cd59e4da4944869ccd022581b332945ebecb9fb21d82cddf319a6480c722a23fc7015
-
Filesize
4.2MB
MD5e379e2e71017a9c9dccc0745dcc93513
SHA1a22081f0620fc1c93c2816b8e87559eb962d6dc4
SHA256fe2bceb7f99dfc746c8f76aa9a3120ab6716cb17d356d5ef95f4fb84a69d8039
SHA512427d35ac0438ae1d70b16b5ba155070a23712b63858b8bf21a780af4201eef6ed6a9df3a1e6f7abb3ac4d24c7b75ba84c1b994f8837eee289a5a6b5c7799605f