Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe
-
Size
84KB
-
MD5
3d5a5f87aee1173ca58005af3940639c
-
SHA1
327be851576b096cb39a8549f2423e2d1c7ab72e
-
SHA256
04357b1c4774b4175ed2bf42d9c0fb8989aa0874e386841d9213d47973172cb1
-
SHA512
de2c8417473ba93c21173eba99d0274164be98426b7b4205b490c1fad35c62040af8282eb30eed873691b92869cb16475699f22780293c56c667f6c86484e4f3
-
SSDEEP
1536:WBxJVbaBKtUZG3GO1sx6KFm8f5772Wh0RHORmEpyf3KHqfv:UxJ5aMtUZG3G5F7R72hBORvciqfv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2836 jusched.exe 2764 jusched.exe -
Loads dropped DLL 3 IoCs
pid Process 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2836 jusched.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\SunJavaUpdateSched = "C:\\Users\\Admin\\AppData\\Roaming\\jusched.exe" 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\u: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\t: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\s: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\q: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\l: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\h: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\w: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\v: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\r: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\p: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\e: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\z: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\x: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\n: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\k: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\g: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\y: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\m: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\j: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File opened (read-only) \??\i: 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2504 set thread context of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2836 set thread context of 2764 2836 jusched.exe 32 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\tesla\files\Uniture Memory Booster v6 1 0 5158-MESMERiZE.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Diskeeper 2010 Pro Premier v14 0 900.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\edonkey2000\incoming\CleanMyPC Registry Cleaner v4 02-TE.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\edonkey2000\incoming\Driver Genius Professional 2009 9.0.0 Build 186.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\limewire\shared\Xilisoft AVI MPEG Converter v5 1 26 1030 Keyg.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\tesla\files\RuneScape 2010 - Newest Exploits.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\WinRAR 3.92 Final.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\bearshare\shared\Windows 7 Toolkit v1.8 activations+full suite.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\edonkey2000\incoming\RuneScape 2010 - Newest Exploits.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\limewire\shared\Atomix Virtual DJ v6.0.2 FINAL Professional.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\tesla\files\Driver Genius Professional 2009 9.0.0 Build 186.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\tesla\files\MS Office 2007 Activation KeyGen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\limewire\shared\Trojan Killer 2.0.6.4 Patch.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa\my shared folder\WinZip PRO v12.1 + Serials.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\WinRAR-3 91 Full + Keymaker.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Microsoft Office 2010 Enterprise Corporate Edition.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\grokster\my grokster\ScreenCapture 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\bearshare\shared\Autorun Virus Remover v2 3 1022-Lz0.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\morpheus\my shared folder\Web Dumper 3.1.1 Keygen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\limewire\shared\office 2007 activation.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\limewire\shared\redsn0w-win 0 8.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\tesla\files\Atomix Virtual DJ v6.0.2 FINAL Professional.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\winmx\shared\Xilisoft AVI MPEG Joiner v1 0 34 1012 Keygen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\grokster\my grokster\Xilisoft AVI MPEG Converter v5 1 26 1030 Keyg.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\grokster\my grokster\LimeWire.Pro.v5.4.6.1.Multilingual.Retail-ZWT.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\bearshare\shared\WinZip PRO v12.1 + Serials.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\edonkey2000\incoming\Trojan Killer 2.0.6.4 Patch.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\morpheus\my shared folder\Diskeeper 2010 Pro Premier v14 0 900.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\limewire\shared\Sony Vegas Pro 9.0 Full.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\winmx\shared\Setup OneCare for Windows 7.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Windows 2008 Server KeyGen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Sony Vegas Pro 9.0 Full.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\icq\shared folder\WinRAR-3 91 Full + Keymaker.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\bearshare\shared\RAR Password Recovery Magic v6 1 1 172-BEAN.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\emule\incoming\Recover Keys v3 0 3 7-MAZE.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\limewire\shared\Web Dumper 3.1.1 Keygen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\tesla\files\Recover Keys v3 0 3 7-MAZE.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\emule\incoming\Driver Genius Professional 2009 9.0.0 Build 186.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa\my shared folder\Diskeeper 2010 Pro Premier v14 0 900.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa\my shared folder\Xilisoft AVI MPEG Converter v5 1 26 1030 Keyg.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Diskeeper 2010 Pro Premier v14 0 900t Final.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Atomix Virtual DJ v6.0.2 FINAL Professional.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Diskeeper 2010 Pro Premier v14 0 900t Final.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\edonkey2000\incoming\ScreenCapture 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\emule\incoming\Diskeeper 2010 Pro Premier v14 0 900t Final.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\emule\incoming\WinRAR-3 91 Full + Keymaker.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\morpheus\my shared folder\Adobe Dreamweaver CS4 Keygen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\emule\incoming\Adobe Photoshop CS4 Extended + Keygen + Activation.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\LimeWire Pro.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\icq\shared folder\CleanMyPC Registry Cleaner v4 02-TE.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\grokster\my grokster\Microsoft Office Accounting Professional 2009.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\grokster\my grokster\Uniture Memory Booster v6 1 0 5158-MESMERiZE.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\bearshare\shared\Microsoft Office Accounting Professional 2009.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\bearshare\shared\Borderlands Proper-Razor1911.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\bearshare\shared\Adobe Dreamweaver CS4 Keygen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\winmx\shared\Miscrosoft Office Ultimate 2007.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\DesktopCalendar.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\icq\shared folder\DesktopCalendar.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\icq\shared folder\ScreenCapture 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\tesla\files\Garmin mobile xt keygen.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa\my shared folder\Website X5 Designer v7.7 WYSIWYG Website Creator.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\YouTube Downloader all Access.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\edonkey2000\incoming\Microsoft AutoCollage 2008.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe File created C:\Program Files (x86)\emule\incoming\kaspersky license key 2010.exe 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe 2764 jusched.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2504 wrote to memory of 2424 2504 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 30 PID 2424 wrote to memory of 2836 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2836 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2836 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 31 PID 2424 wrote to memory of 2836 2424 3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe 31 PID 2836 wrote to memory of 2764 2836 jusched.exe 32 PID 2836 wrote to memory of 2764 2836 jusched.exe 32 PID 2836 wrote to memory of 2764 2836 jusched.exe 32 PID 2836 wrote to memory of 2764 2836 jusched.exe 32 PID 2836 wrote to memory of 2764 2836 jusched.exe 32 PID 2836 wrote to memory of 2764 2836 jusched.exe 32 PID 2836 wrote to memory of 2764 2836 jusched.exe 32 PID 2836 wrote to memory of 2764 2836 jusched.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d5a5f87aee1173ca58005af3940639c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\jusched.exe"C:\Users\Admin\AppData\Roaming\jusched.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\jusched.exe"C:\Users\Admin\AppData\Roaming\jusched.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD53d5a5f87aee1173ca58005af3940639c
SHA1327be851576b096cb39a8549f2423e2d1c7ab72e
SHA25604357b1c4774b4175ed2bf42d9c0fb8989aa0874e386841d9213d47973172cb1
SHA512de2c8417473ba93c21173eba99d0274164be98426b7b4205b490c1fad35c62040af8282eb30eed873691b92869cb16475699f22780293c56c667f6c86484e4f3