Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
90327e318921092834607dc4186692eb_JaffaCakes118.jad
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
90327e318921092834607dc4186692eb_JaffaCakes118.jad
Resource
win10v2004-20240426-en
General
-
Target
90327e318921092834607dc4186692eb_JaffaCakes118.jad
-
Size
69KB
-
MD5
90327e318921092834607dc4186692eb
-
SHA1
9ce173e0cb94d338fef281c072d129ac96cbdd84
-
SHA256
a526c866b823d12d7c128bb7ced0017bf1f6a5caee02a2dc1b44de8684d88652
-
SHA512
05d61dfecc5e138b92ec11312bf804ecee02b7741aef2fe11b869d884c31c4d88e14278a008421dee60b0ee2b118a1afda19922e75b22727b43faac742ce501a
-
SSDEEP
768:AVxA92YZUeY5A76pWG9zvyti4dPQq1dUqr71pEQsrGsjjYnclZBZtiX/VCxxxGck:exY2pxBWG1vAxhEopds7lrQdC1zsej5i
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2532 2456 cmd.exe 29 PID 2456 wrote to memory of 2532 2456 cmd.exe 29 PID 2456 wrote to memory of 2532 2456 cmd.exe 29 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30 PID 2532 wrote to memory of 2640 2532 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\90327e318921092834607dc4186692eb_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\90327e318921092834607dc4186692eb_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\90327e318921092834607dc4186692eb_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5429eb0c5f266feaba22cc77d1966b81e
SHA123dfaaed5fdfde7b273298bb09987505179b0519
SHA256c71a720a2b8b21ceb1b2b7935a210e70c6f3ec44db2329b3f974ae4fcd59e1dc
SHA512443b4a786e13a28c2d8105ae63e9bdbe8c65c83f9b5879957da4fd5f0d73c2f94b3e88ecf58253072a085a2f4102cdd02717464740bf6709cbbd2a66ee6655f1