Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
75bdc078e8c3d657b4e9219534386bd6_JaffaCakes118.jad
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
75bdc078e8c3d657b4e9219534386bd6_JaffaCakes118.jad
Resource
win10v2004-20240226-en
General
-
Target
75bdc078e8c3d657b4e9219534386bd6_JaffaCakes118.jad
-
Size
69KB
-
MD5
75bdc078e8c3d657b4e9219534386bd6
-
SHA1
a4818f62cb3ce022cc54b5eb56bd73fe7430207b
-
SHA256
1ba65b17809525f85e899f4431d5948c8a906f15ca5a7b82881d3fc031e681f0
-
SHA512
a2df4d1bfee8d9d9eedb1994bc7ea3e842299bcaf6923741a0dc679b7cc30e97d1f7d8ac60d8beee0f410e0f9d2975187bd35e84808f512998c03fd2dc9058d7
-
SSDEEP
1536:exY2pxBWG1vAxhEopXshyWZGDBKB0CEsej5k:cVhYVN+yWZ2RCEseFk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2944 2984 cmd.exe 29 PID 2984 wrote to memory of 2944 2984 cmd.exe 29 PID 2984 wrote to memory of 2944 2984 cmd.exe 29 PID 2944 wrote to memory of 2692 2944 rundll32.exe 30 PID 2944 wrote to memory of 2692 2944 rundll32.exe 30 PID 2944 wrote to memory of 2692 2944 rundll32.exe 30 PID 2944 wrote to memory of 2692 2944 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\75bdc078e8c3d657b4e9219534386bd6_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\75bdc078e8c3d657b4e9219534386bd6_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\75bdc078e8c3d657b4e9219534386bd6_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53c422c95b38874880cdcbd5cef343675
SHA175ae298edf057aa4baaeecb2916b9a9ec6209fa0
SHA2562cc39bd68c4a3cfe41cdb042de6ab0180a34b7cdea0f480defaf44b7bca93c51
SHA5124205950739af14b0e0b7fc9dca0947f89c59e558b87efb8c54b2944f045776832adeb37adc2b861e76443afd14b7cc383b1cb1e2c1e0e1a2ed3797ce6fd2e2ea