Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
63eaae9628346f78e68cc95b84604840_JaffaCakes118.jad
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63eaae9628346f78e68cc95b84604840_JaffaCakes118.jad
Resource
win10v2004-20240426-en
General
-
Target
63eaae9628346f78e68cc95b84604840_JaffaCakes118.jad
-
Size
69KB
-
MD5
63eaae9628346f78e68cc95b84604840
-
SHA1
962c5d1389b061e2129476edb120648f361e7466
-
SHA256
3cf0c794f6d318040a8cd05bd4aef8a637fb3ca52681bc87fadc144d463f2729
-
SHA512
0482913b54a39f03155f2952f02d180cd762b57ad9f39909883e0827ac1828984d709a17ce9f05ed72e077e1ed665a363691c72a48fd313e495b9f4128607c00
-
SSDEEP
1536:exY2pxBWG1vAxhEopBwsH66qBtNVO77sej5t:cVhYVPwa6/BtnO77seFt
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2456 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2456 AcroRd32.exe 2456 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2932 wrote to memory of 2568 2932 cmd.exe rundll32.exe PID 2932 wrote to memory of 2568 2932 cmd.exe rundll32.exe PID 2932 wrote to memory of 2568 2932 cmd.exe rundll32.exe PID 2568 wrote to memory of 2456 2568 rundll32.exe AcroRd32.exe PID 2568 wrote to memory of 2456 2568 rundll32.exe AcroRd32.exe PID 2568 wrote to memory of 2456 2568 rundll32.exe AcroRd32.exe PID 2568 wrote to memory of 2456 2568 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\63eaae9628346f78e68cc95b84604840_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\63eaae9628346f78e68cc95b84604840_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\63eaae9628346f78e68cc95b84604840_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ce79ba2d463c9253bd72282bc3312dbf
SHA137915cbfee1403895a26f409e2bc5652f66f544c
SHA256ddf3a427aa73c96e1bddab168c13d4c52468498f2bd2eec92fdb30baca3e15c6
SHA512905b1926ef2ae84671fe1c3f5acc460c304ea14edb3763e3078cb44ed08281818003c82228d3c442b1368daae28b95c97e0f6a0285301f6f58524bc2feb3b8d8