Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe
-
Size
552KB
-
MD5
27b7f18f30f2b476f82b125c4c1f82dd
-
SHA1
c5c8711cd86a8d8ab893d69339d7d7636a09591a
-
SHA256
76462ae7e52f20c9e440e0475b44741146e3ae17553afe473d0d56decdead49f
-
SHA512
75d00e02008add5931a3b768ffbf8e02b0cd22f207c7a69cba41cce54a4d1caa04fa41e8b4535fef7976c88dbcc140805ee2e9a85f1b06371242c9b55de78ef5
-
SSDEEP
12288:ILtcLzJxRfzAVTaB0UW8XUQz3X/bTxj86nscz28V:IiJxag++Bz/b9jjscr
Malware Config
Signatures
-
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/files/0x0008000000018f58-3.dat MailPassView -
Nirsoft 1 IoCs
resource yara_rule behavioral1/files/0x0008000000018f58-3.dat Nirsoft -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts Hxkds.exe -
Executes dropped EXE 2 IoCs
pid Process 2020 google earth pro download crack.exe.exe 2900 Hxkds.exe -
Loads dropped DLL 4 IoCs
pid Process 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 2020 google earth pro download crack.exe.exe 2020 google earth pro download crack.exe.exe 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main google earth pro download crack.exe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2020 google earth pro download crack.exe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 google earth pro download crack.exe.exe 2020 google earth pro download crack.exe.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2020 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2020 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2020 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2020 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2020 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2020 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2020 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 31 PID 2452 wrote to memory of 2900 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 32 PID 2452 wrote to memory of 2900 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 32 PID 2452 wrote to memory of 2900 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 32 PID 2452 wrote to memory of 2900 2452 27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\google earth pro download crack.exe.exe"C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\google earth pro download crack.exe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\Hxkds.exe"C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\Hxkds.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5f4c84fb4f0596f0eddee2f8d3fc62215
SHA1ea718d3c298d2d620f9b56a2d60efdd693b042f4
SHA256cdc3d8732d618a44f162eb1f1e0fa4a745bf7f256e2bddb953de630908f3cd5b
SHA51244a39271ef42b848f56e609f60f9ce042074eb0261926aaef972cc08958b6212a4dec7bc57f1a55f197bc83a99e76b03804f4534e463922785ce5abd956aea54
-
Filesize
529KB
MD551c2daa26f14d3483093755b73aa3fc6
SHA1ca2acdbccdaf66f61f6f70c4b335867074555a7e
SHA2561d67062fe7c7e027e883543aa7205a4f7de9d74f8db24513359e6c276f051d2f
SHA512ae22a9415e44e029ace7883d9bfb67e6b5033c8a97f637590711c88f44d2542ded93e211484a097e8b20672b81f2065e8a9a2b6144383a0c2e4424e390a1770f