Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
82ef4bcb4372537f0cd516edf0c690db_JaffaCakes118.jad
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82ef4bcb4372537f0cd516edf0c690db_JaffaCakes118.jad
Resource
win10v2004-20240508-en
General
-
Target
82ef4bcb4372537f0cd516edf0c690db_JaffaCakes118.jad
-
Size
71KB
-
MD5
82ef4bcb4372537f0cd516edf0c690db
-
SHA1
e447407d8c39e7bb190c726d40292ed2388bede3
-
SHA256
4c6c55e753e1822a333c83146b87021e5212c464c90cb334e5022328f3623fe5
-
SHA512
b2cdef71c984b47bcfbe80cb50cac55edc208716264b541c8bb023ad3f76e0ee0b5dea36a83ea7be274fb75adc2f0b1c7a375342e14da28dc920a850350021e6
-
SSDEEP
1536:exY2pxBWG1vAxhEop5uVZeogb9owsej5r:cVhYVXuno2wseFr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1744 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1744 AcroRd32.exe 1744 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2884 2008 cmd.exe 29 PID 2008 wrote to memory of 2884 2008 cmd.exe 29 PID 2008 wrote to memory of 2884 2008 cmd.exe 29 PID 2884 wrote to memory of 1744 2884 rundll32.exe 30 PID 2884 wrote to memory of 1744 2884 rundll32.exe 30 PID 2884 wrote to memory of 1744 2884 rundll32.exe 30 PID 2884 wrote to memory of 1744 2884 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\82ef4bcb4372537f0cd516edf0c690db_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\82ef4bcb4372537f0cd516edf0c690db_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\82ef4bcb4372537f0cd516edf0c690db_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58b912817d1de2fb4b21669a864d5e9dc
SHA144f1dfcd80d1c3ae2865474fea6ba02fa1b15819
SHA256b39d543cea70e02888aad7b190e56a144cfd35b436e0c0ceb4ed54a4e6a963af
SHA5127f036757fb9ab62292b29d819de907b04a262b58921bca3e9a7073ff931a06f3829b1b7810e8542850367f7d64d4f873d731a152f434b8f0c3f3a740509aa0bc