Overview
overview
7Static
static
38498595074...18.exe
windows7-x64
78498595074...18.exe
windows10-2004-x64
7$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240226-en
General
-
Target
8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe
-
Size
137KB
-
MD5
8498595074fd8ce02ddb211026cf57de
-
SHA1
feeaf79d988f9661b9a5535a9c6627a08bdb2b33
-
SHA256
f9955931889f37f789252f35cba7a9742de8ecf52aac427d59bb671a6abb45eb
-
SHA512
d07e42e2c2c63c0658cc219d8c2ea3256e7bb805ecac8304e36fc2a8ac101636cf676e5fed6ae395540ea990347dc6f384599d5d0e4219093f5872f5652ae40b
-
SSDEEP
3072:7TQIURTXJ2W8eZacsB2ybhpU9tAAB+56iSpfUivjQ6:nsycsB2ybhpU96AB+5bSS6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2804 Au_.exe -
Loads dropped DLL 4 IoCs
pid Process 2480 8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe 2804 Au_.exe 2804 Au_.exe 2804 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000800000001431b-2.dat nsis_installer_1 behavioral1/files/0x000800000001431b-2.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2804 Au_.exe 2804 Au_.exe 2804 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2804 2480 8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe 28 PID 2480 wrote to memory of 2804 2480 8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe 28 PID 2480 wrote to memory of 2804 2480 8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe 28 PID 2480 wrote to memory of 2804 2480 8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8498595074fd8ce02ddb211026cf57de_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
Filesize
137KB
MD58498595074fd8ce02ddb211026cf57de
SHA1feeaf79d988f9661b9a5535a9c6627a08bdb2b33
SHA256f9955931889f37f789252f35cba7a9742de8ecf52aac427d59bb671a6abb45eb
SHA512d07e42e2c2c63c0658cc219d8c2ea3256e7bb805ecac8304e36fc2a8ac101636cf676e5fed6ae395540ea990347dc6f384599d5d0e4219093f5872f5652ae40b