Overview
overview
8Static
static
31a5709a9fa...18.exe
windows7-x64
81a5709a9fa...18.exe
windows10-2004-x64
8$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3C:/windows/bch.exe
windows7-x64
C:/windows/bch.exe
windows10-2004-x64
$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3C:/windows/cdi.exe
windows7-x64
C:/windows/cdi.exe
windows10-2004-x64
$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3C:/windows/dss.exe
windows7-x64
C:/windows/dss.exe
windows10-2004-x64
$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3C:/windows/hti.exe
windows7-x64
C:/windows/hti.exe
windows10-2004-x64
$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3C:/windows/xtr.exe
windows7-x64
C:/windows/xtr.exe
windows10-2004-x64
$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
C:/windows/bch.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
C:/windows/bch.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
C:/windows/cdi.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
C:/windows/cdi.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
C:/windows/dss.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
C:/windows/dss.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
C:/windows/hti.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
C:/windows/hti.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
C:/windows/xtr.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
C:/windows/xtr.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240508-en
General
-
Target
1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe
-
Size
125KB
-
MD5
1a5709a9fa14ec04f92422407f5f246e
-
SHA1
fe7e13edfdd092a11f21489de845eb4f6c1ac0b5
-
SHA256
1c3669d375ddc4dbb85d8c98959ccebc65173009779b19ce8256e6d971baebe7
-
SHA512
5c599af9790d5567576dce554dc77004d7d2ac4297318224e15062745c83382d7d15f3d7c90a7e642cc9f56d8bae1fa497bab91c9af059ba76ad8fb81762867f
-
SSDEEP
3072:AQIURTXJwVp5lL8RDRBXUlSdW9cpK4vwbxrG:Asml45PXUlSdWOpfWxrG
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe -
Loads dropped DLL 6 IoCs
pid Process 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\windows\cdi.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File opened for modification C:\windows\dss.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File opened for modification C:\windows\bch.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File created C:\windows\hti.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File opened for modification C:\windows\hti.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File opened for modification C:\windows\xtr.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File opened for modification C:\windows\cdi.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File created C:\windows\dss.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File created C:\windows\bch.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe File created C:\windows\xtr.exe 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000800000002328d-6.dat nsis_installer_1 behavioral2/files/0x000800000002328d-6.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\33E4E80807204C2B6182A3A14B591ACD25B5F0DB 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\33E4E80807204C2B6182A3A14B591ACD25B5F0DB\Blob = 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 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\D89E3BD43D5D909B47A18977AA9D5CE36CEE184C\Blob = 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 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1348 wrote to memory of 4652 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 91 PID 1348 wrote to memory of 4652 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 91 PID 1348 wrote to memory of 4652 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 91 PID 4652 wrote to memory of 5024 4652 cmd.exe 93 PID 4652 wrote to memory of 5024 4652 cmd.exe 93 PID 4652 wrote to memory of 5024 4652 cmd.exe 93 PID 1348 wrote to memory of 3844 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 94 PID 1348 wrote to memory of 3844 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 94 PID 1348 wrote to memory of 3844 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 94 PID 3844 wrote to memory of 324 3844 cmd.exe 96 PID 3844 wrote to memory of 324 3844 cmd.exe 96 PID 3844 wrote to memory of 324 3844 cmd.exe 96 PID 1348 wrote to memory of 2796 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 97 PID 1348 wrote to memory of 2796 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 97 PID 1348 wrote to memory of 2796 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 97 PID 2796 wrote to memory of 1572 2796 cmd.exe 99 PID 2796 wrote to memory of 1572 2796 cmd.exe 99 PID 2796 wrote to memory of 1572 2796 cmd.exe 99 PID 1348 wrote to memory of 1712 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 100 PID 1348 wrote to memory of 1712 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 100 PID 1348 wrote to memory of 1712 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 100 PID 1712 wrote to memory of 4396 1712 cmd.exe 102 PID 1712 wrote to memory of 4396 1712 cmd.exe 102 PID 1712 wrote to memory of 4396 1712 cmd.exe 102 PID 1348 wrote to memory of 2244 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 103 PID 1348 wrote to memory of 2244 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 103 PID 1348 wrote to memory of 2244 1348 1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe 103 PID 2244 wrote to memory of 3636 2244 cmd.exe 105 PID 2244 wrote to memory of 3636 2244 cmd.exe 105 PID 2244 wrote to memory of 3636 2244 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a5709a9fa14ec04f92422407f5f246e_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C at 19:25 /every:M,T,W,Th,F,Sa,Su ""C:\windows\cdi.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\at.exeat 19:25 /every:M,T,W,Th,F,Sa,Su ""C:\windows\cdi.exe""3⤵PID:5024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C at 19:30 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dss.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\at.exeat 19:30 /every:M,T,W,Th,F,Sa,Su ""c:\windows\dss.exe""3⤵PID:324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C at 19:35 /every:M,T,W,Th,F,Sa,Su ""c:\windows\bch.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\at.exeat 19:35 /every:M,T,W,Th,F,Sa,Su ""c:\windows\bch.exe""3⤵PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C at 19:40 /every:M,T,W,Th,F,Sa,Su ""c:\windows\hti.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\at.exeat 19:40 /every:M,T,W,Th,F,Sa,Su ""c:\windows\hti.exe""3⤵PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C at 19:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\xtr.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\at.exeat 19:45 /every:M,T,W,Th,F,Sa,Su ""c:\windows\xtr.exe""3⤵PID:3636
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
69KB
MD5b7603c02e4711a0c2ba60165a07913f7
SHA1b604896b3843ae812bac4dd800875d55b710b004
SHA256cc3fb2dc03a5bdc7d5019645c9087f437547b16f877503022c65e5b069ac4276
SHA5124f4127abb5efcad3a26998206bc062a0d9e591d16ae15bb5e6a2123aadc857e007fb237f64e3d4312e474491c20610cb58ec199f84bd0b8ccb0b7025da9d15be