Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe
-
Size
863KB
-
MD5
0d3e3fd44faa32e0d83b02c8b7cff49c
-
SHA1
ee7c5cf5f68ed174e07fed1fc55febe72c313cd4
-
SHA256
1203693a4ad21c5c12ec157f4ebbede35132188f02de8ce0f3ee6780788dae55
-
SHA512
edce1d5a90a0313ccd53d82a0d11ca1e87f6ed554a66667e6fbfa7b48ca1d2f1b6dad92604ec7ad28c0138a0e6db9689e3aaea81bc55a3b4ee531bc47f47d17c
-
SSDEEP
24576:RmfVjt5U9LdcThQMiqBrJ+AcsOk6DZGrhZec5Yax+5dH8q2QbZAf:UfVjtqxdcTh9Bl+AchzDZGlZec5Yax+S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2068 acroedit.exe -
Loads dropped DLL 2 IoCs
pid Process 2916 0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe 2916 0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\acroedit.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\10.0\\acroedit.exe /300" acroedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\acroedit.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\10.0\\acroedit.exe /264" 0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString acroedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 acroedit.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe 2068 acroedit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2068 acroedit.exe 2068 acroedit.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2068 2916 0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe 28 PID 2916 wrote to memory of 2068 2916 0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe 28 PID 2916 wrote to memory of 2068 2916 0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe 28 PID 2916 wrote to memory of 2068 2916 0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d3e3fd44faa32e0d83b02c8b7cff49c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\10.0\acroedit.exeC:\Users\Admin\AppData\Roaming\Adobe\Acrobat\10.0\acroedit.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD5c4c4f046d0d4be0cddbf91b79adbefb1
SHA1d5c7325797341ab0e8b9a0b9f289002e7590f05a
SHA256f584e9d40f4e9ce1cf745fc7413b26805e84462d323161aabe057873fa76f0cf
SHA51222e3bf01db108815625c439b24cc482e91132d80858653773fc46de626f0bc785ea0ce982952f5c2b1cf86049160ec994101828f53449829a53f73755a309730