Overview
overview
10Static
static
36f76d0c1fb...18.exe
windows7-x64
106f76d0c1fb...18.exe
windows10-2004-x64
10$APPDATA/U...ui.dll
windows7-x64
1$APPDATA/U...ui.dll
windows10-2004-x64
1$APPDATA/U...en.exe
windows7-x64
1$APPDATA/U...en.exe
windows10-2004-x64
1$APPDATA/c...fswipe
ubuntu-22.04-amd64
1$APPDATA/p...mp.dll
windows7-x64
1$APPDATA/p...mp.dll
windows10-2004-x64
1$APPDATA/u...ui.dll
windows7-x64
1$APPDATA/u...ui.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/diaeresis.dll
windows7-x64
4$TEMP/diaeresis.dll
windows10-2004-x64
4$TEMP/name...pt.exe
windows7-x64
$TEMP/name...pt.exe
windows10-2004-x64
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$APPDATA/USER/doinstall/strFormId/logo/msdnmui.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$APPDATA/USER/doinstall/strFormId/logo/msdnmui.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$APPDATA/USER/doinstall/strFormId/logo/resgen.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$APPDATA/USER/doinstall/strFormId/logo/resgen.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$APPDATA/credits/ntfswipe
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral8
Sample
$APPDATA/period/plan/frequency/clean/msddslmp.dll
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
$APPDATA/period/plan/frequency/clean/msddslmp.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
$APPDATA/u2/mailto/connectt/DbgUrtMui.dll
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
$APPDATA/u2/mailto/connectt/DbgUrtMui.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
$TEMP/diaeresis.dll
Resource
win7-20240215-en
Behavioral task
behavioral15
Sample
$TEMP/diaeresis.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
$TEMP/namespace/CMAccept.exe
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/namespace/CMAccept.exe
Resource
win10v2004-20240426-en
General
-
Target
6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe
-
Size
568KB
-
MD5
6f76d0c1fb88337cb281b250e2c178fd
-
SHA1
c7b1e09633191070ee87a3d5bcd8e2ff3eb48151
-
SHA256
0ab29a1c5c76e79998b45ddc32e3377d3f59bcd99a0f67f3e831ad02996c96b8
-
SHA512
c54029e5999b21b631f150469de6ee07c852cf232e51255cc720f14994edcf4e17ded7b1ba6284da9a3afe921cb41700bd718b4983dc6705ae3e9975b59394b1
-
SSDEEP
12288:1cUCnVQx9b6IRQGCvYC240ImI5b48EKlRg1TdyBurkF0MfkOMvlxiDF:1cUjfbHRQK/4vx16r5aRp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3696 explorer.exe 3256 GetX64BTIT.exe -
Loads dropped DLL 2 IoCs
pid Process 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 api.ipify.org 40 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 7536 3696 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe 3696 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3696 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83 PID 3468 wrote to memory of 3696 3468 6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f76d0c1fb88337cb281b250e2c178fd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\explorer.exe"C:\Users\Admin\AppData\Local\Temp\explorer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 15763⤵
- Program crash
PID:7536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3696 -ip 36961⤵PID:7512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
10KB
MD551921a259471561b82e7b37b08cac3a5
SHA1a3d991d42e1861f4db64438969116771bc8dbb81
SHA25632dc82dd46ca4e4937b9f3c31988dde9cd1cfd4c907798d942b13394169f1bf6
SHA5122446084e48688f37e60116c734dc9c8172e3692b2dde6e915c35f89bed7c383c4c62516680b4a701f3a8d29bcfdf7418f9846c302d4a64f042aabe000b07aa7a
-
Filesize
4.2MB
MD50155e85852fde62a441cbaf485e023be
SHA159482d4b1c0f061426ef71bff8506230faa00701
SHA256e0689419d3d7879a229ecf3e74639e4e9ba0669ed4574f47b108097593fc9fbc
SHA512f1a43adb7b0203dc5ad4613da9645070c4da0d15d8788b50644cb80420d4a38151488aa3888da39a6cb17ef6d3f5ebc5fe08ac948dca1fd0c852dceecd3bafff
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
28B
MD5ee3c0e9b87c75ad554eb0bdb745adbd2
SHA1f81cea14c67774a4c88c5c52bad21334599caba7
SHA256e0e6eee9bc0508179752fe8454313096895aa11536af5c66aa928ae1d107e915
SHA5122e25a090e24de4886363edd350d7aec83eb7bd8ceaa1bbc281c7178ccdcfa216a03084a62b330d526ddf8c763bd09d6d04ef2529935f309b0d105702816ea8c7
-
Filesize
131B
MD59848e4efb0abd437d65e6d3d1d973adb
SHA1f427ac7c50b19f66658ae7f92cbaf21110b49a47
SHA256c8b84add37da849977a84fe62badb6cb908be99769edb70d60bcd04c0aec2a3f
SHA512f90f1f65b6b824a526469b8d739f733a54a7f485d8b5f680de7a35fac90786bf6ba5a0b1d62e139663c5ee73b8d687cf32d4ccf188e18c53084ec12d8c216b17