Overview
overview
7Static
static
3658f78184b...18.exe
windows7-x64
7658f78184b...18.exe
windows10-2004-x64
7$PLUGINSDI...rl.dll
windows7-x64
3$PLUGINSDI...rl.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
1$PLUGINSDI...nu.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...b2.dll
windows7-x64
3$PLUGINSDI...b2.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
3$PLUGINSDI...on.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
1$PLUGINSDI...ib.dll
windows10-2004-x64
1$PROGRAMFI...R6.exe
windows7-x64
1$PROGRAMFI...R6.exe
windows10-2004-x64
1$PROGRAMFI...zt.exe
windows7-x64
1$PROGRAMFI...zt.exe
windows10-2004-x64
1$R6.exe
windows7-x64
1$R6.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
658f78184be7051163d1b46cec615012_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
658f78184be7051163d1b46cec615012_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/EstUrl.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/EstUrl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsWeb2.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsWeb2.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/workerExtension.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/workerExtension.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/zumlib.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/zumlib.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
$PROGRAMFILES/ESTsoft/ALUpdate/$R6.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$PROGRAMFILES/ESTsoft/ALUpdate/$R6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PROGRAMFILES/ESTsoft/Common/ezt.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
$PROGRAMFILES/ESTsoft/Common/ezt.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
$R6.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
$R6.exe
Resource
win10v2004-20240426-en
General
-
Target
658f78184be7051163d1b46cec615012_JaffaCakes118.exe
-
Size
16.9MB
-
MD5
658f78184be7051163d1b46cec615012
-
SHA1
ed7a15e0e7e6d6f1317ae30cb93a670a0072cf4f
-
SHA256
df5b4f8f0a459bb640a2a42028d9c9afd048d136ae98583d4040b01b07260167
-
SHA512
62545703ac72397dd98c4ced912f2379c398b9a48e2d78751df92e540e5b8ee4755c21c60ce767177b4078fdf199d0483c2ac4be90584546f7433304feb1b62e
-
SSDEEP
393216:GJ/oIL+cnAWGVuL4VmxXT5/WvTymGW2yoepd4Whbr:G+I6cAxoL4VmXuGmG4dWA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
stext.exepid process 2700 stext.exe -
Loads dropped DLL 6 IoCs
Processes:
658f78184be7051163d1b46cec615012_JaffaCakes118.exepid process 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe -
Checks for any installed AV software in registry 1 TTPs 6 IoCs
Processes:
658f78184be7051163d1b46cec615012_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast 658f78184be7051163d1b46cec615012_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 658f78184be7051163d1b46cec615012_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop 658f78184be7051163d1b46cec615012_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast 658f78184be7051163d1b46cec615012_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AhnLab\V3IS80 658f78184be7051163d1b46cec615012_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira\AntiVir Desktop 658f78184be7051163d1b46cec615012_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
stext.exepid process 2700 stext.exe 2700 stext.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
658f78184be7051163d1b46cec615012_JaffaCakes118.exedescription pid process target process PID 2420 wrote to memory of 2700 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe stext.exe PID 2420 wrote to memory of 2700 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe stext.exe PID 2420 wrote to memory of 2700 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe stext.exe PID 2420 wrote to memory of 2700 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe stext.exe PID 2420 wrote to memory of 2700 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe stext.exe PID 2420 wrote to memory of 2700 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe stext.exe PID 2420 wrote to memory of 2700 2420 658f78184be7051163d1b46cec615012_JaffaCakes118.exe stext.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\658f78184be7051163d1b46cec615012_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\658f78184be7051163d1b46cec615012_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\stext.exe"C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\stext.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD594715ab02d666f0b19590030e1bd4f8a
SHA1887f618c0ac49ce0209a0e54f6ae97ac501764df
SHA256d1b6bbc5aafc9d3d578d7644d28223a64f6c74b31503e260a76037b7d4bf3ccf
SHA512d6155ea4b62299ed8dd941cd9454aa437a28a6e73e1b4846e18f80fa259ab2a9f819bcd0a8e1cc99ed0e2ae2d8ab921dd041018a08c70bf8a2be44ec0a9442ff
-
Filesize
3KB
MD57df755f1fd4936268507acba151bdbfb
SHA188244f9f5b1188ddb7cba16668904ea7c8c8c847
SHA256129e7c9241e303ee196cda84fb67ccbd58de350497af64140189189f0e46c598
SHA5122c64e8a7414582c36f3a793c82b64864e0f56c6a8bac5f7bd2ce16b0692c25751383d640749926d075608b8a8827d272a6e6a5d74cb4e89e341f24994d85bf6a
-
Filesize
3KB
MD5c1d6b84db278fe1716ba3fc68f225b4e
SHA1720efb690f7a4028341da72787f92183612318c0
SHA2568d6dadb7a20ea2cc492d7cb1034ad68d2ac2c291fdd4463256c3588e2c929342
SHA5127f91248db8b8ff8a6b1c8492ea40c10dc4fefb0861b86638f80d3130c29bf1f43c695be22f1a79cd3d19ff44d495d6e72a6b2d6ee4432e31a04f44afdf1ba07d
-
Filesize
1KB
MD52d4eeb351bdd8bcd4727f9acf8eee2f2
SHA1e4f2af1829eb65957f8d5ed88b53770b274c0e9f
SHA256dd6932af1cfd044900f319c66f4015343b6c93771e52c29918ced5fdb79cec08
SHA51231a1b3eed57176421b54b46deb94a2d0b3ff71a112e0939c99ba2dd57cd1ebfe8195bed63db18b7fb06ea2663ceef8d58081fec9fea2498426f234ba43ca928e
-
Filesize
5KB
MD5e7ee760c7197832923d16e7066b47814
SHA148f9ca2f31ebcbd638c7fab602b2ac1094acdf0c
SHA25679ee8e2762f9edbc0eb76ed6f3fc0cd05ceb8a776d0684c71d44b8abb39d8e40
SHA5125f4b79eeaa755ecb184d7b6ea4a4e568435c8a95ea721673c553c59a5208aad7cf8eeadb0cb934f8308caba6e66090046bdbe83b90f67d3d2025445618ff8518
-
Filesize
25KB
MD5e7dbe79c26db8f4b4be7bcfc37c13298
SHA182150b4c51b51da27360de54e450aa58a4d6ee68
SHA25637752f12c27eff16f03226a4df11fafc50d94be94040e1317f81f3820b43c3ee
SHA5127c4a89fb4c4fcc0dcc83228eb6cb70e282b7c1baeef7f70f527fcebee49bcb8e6e741d8b3e057fbf604e014d1a79daeee587e6f0e12d403ab8af10b6ece761d0
-
Filesize
21KB
MD5f4bb786568837e88014b62e81b7ec6a3
SHA1358e4979622bc4d2ce30cf8ead5a80b97f3c740e
SHA25662849fefefecfaed616192c691481f1c3844c36eb25baafa5a9c312d223b1c28
SHA51279d91bb49ecfb522eaf660cdeae6c6c7618444f69520a71439a898aded1471ef28b3ffaeef18bfc9f83da9dfbd0037a8b00ed98090b3eae910c870953442b703
-
Filesize
181KB
MD52c5e13287d27b526c01aace7ea92be9e
SHA13b7895f3e3f9dfa9797d2cf04ad7d3d5548210e6
SHA256986ea6d67ded7e67cefe739902194751643982293154ba496d4b5076e0df38e4
SHA51251702649d7ccdfd90a1b7d06699d0791ed60fa2419013deda826cfbfac57231fb06000d1e8a3bf866459ad8597393cdf95e559f575dc51c236c3205c69bc36b6
-
Filesize
10KB
MD5b666f31c4c24be1d4d47cfb55dd35f96
SHA1fee917ead511a6c14538c72539fa740edc7d82c5
SHA25607aefeeea75705edcc3a21ac7dc4b5b837c234c041b725c245b50a73ffabb78a
SHA5126dd69a085b6b2a2671ec6545bae27a72151457ccd76c3bc43a4544f4910fd8791251fb08c2f068d54dd91a6093bed50a80afb68875a9ddf29ae43c42a7337bc8
-
Filesize
3KB
MD56717338e4e0f6283ded89d771c849260
SHA1aa7dcc18d6bf3b2fb0e74466fb2a5d60cc8aa60c
SHA2562d0f153a0a09bb6217cccf3d015100f80216e717bbb9e00eb2482a0964a9c361
SHA5125e3e8c1ce87edf8bfb2556dd5672e1c1e9e37e629fc013167a93fded04e65b79c9b6b192b252daffe45c6d03480f825e1fbf998064edd2771cbce925d85d2280
-
Filesize
197KB
MD5d8113c015116547827b0cdc4869c244a
SHA182392f5483c6c175b3955cdf39aa87d550266ecc
SHA256b7baa631014fbda8fdce67c8b660de8507aaee9b8c572d21746b3078341d3885
SHA512907c61006a58dcafa812f03fa08b58814950f66e9019bfcc12eefc59b0f7ab2ddee040e2ab162b7e09c3f47cdc71c914307a6fe7b89e11033edea7131fc2f563
-
Filesize
645KB
MD56284606ed3cde0677eed03e9a9e7f063
SHA1e59a99dd2d51fd491adab51a9f08b75bce82c3b2
SHA2563e4e33e0a0b65e5546604fbcd83014fc3d467eb16a3d9cab0e53284ceb9616a9
SHA512c535b8e690e47f11609f84ac494dbb301828f367e0a914263463d29d412c1cdba422767b9f3aacae272e63cebbd22b707577d0de9d566bd96163fac633371b7b
-
Filesize
549KB
MD5e22882c6a4f464b95f0137dafedf18be
SHA111e845fb4d6c56c63814346c854e89b9138b2fac
SHA25631c46010d24673fcbfcc0f17dceb5fd72520fc92b6a43ae987e35786a50961f6
SHA512d9bc60317c64679f7e95142b10e154be014912aed551abdb871f94b5d14ac3c918b54b281b5f4fb2f00c1761c089ac56e2df8f99ddfb096a9af4a28d1cfdbdb0