Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
91098313468eaf26d1eaf7008bef1a3e_JaffaCakes118.jad
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91098313468eaf26d1eaf7008bef1a3e_JaffaCakes118.jad
Resource
win10v2004-20240508-en
General
-
Target
91098313468eaf26d1eaf7008bef1a3e_JaffaCakes118.jad
-
Size
606KB
-
MD5
91098313468eaf26d1eaf7008bef1a3e
-
SHA1
4678a796adaef508e2b0b2e8e42f25357f51cc4e
-
SHA256
f31f5da9429ede7b416cef0fe5040af392f9f382e8d24f8b79a9293455fe6377
-
SHA512
50f11be4ff0f36659372eb0090d66e4e9d297dbb418d42b1652b362911fbfbd27a53800b5de8f9968636e777b769bf085dd2c491c0c9b96e71efca70a1e010bf
-
SSDEEP
12288:fLSOUvshRILrnBGDlWrjk5t3jVi2XlHFonSYElgH526Q:fuO+shRqnwck5RjL/YkgHYH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1500 wrote to memory of 2660 1500 cmd.exe 29 PID 1500 wrote to memory of 2660 1500 cmd.exe 29 PID 1500 wrote to memory of 2660 1500 cmd.exe 29 PID 2660 wrote to memory of 2760 2660 rundll32.exe 30 PID 2660 wrote to memory of 2760 2660 rundll32.exe 30 PID 2660 wrote to memory of 2760 2660 rundll32.exe 30 PID 2660 wrote to memory of 2760 2660 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\91098313468eaf26d1eaf7008bef1a3e_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\91098313468eaf26d1eaf7008bef1a3e_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91098313468eaf26d1eaf7008bef1a3e_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fd51ebf30a336f7832a2891890908e5f
SHA1518196899277464ceebf56d5d7d8eb8335b3a311
SHA2561f98d3ccda90a3c786e29d9c6deef9d11f7de49090afdb2c0da3cd8c03ef0e3a
SHA5120be14823a12ce99f5310dcfc4d390035fa2f5000dd0ccdf241b6e2ef3646525f89400a6d8807cee5798b3a72e3c561effe4b8c55e8796a1a53703e36ae4df563