Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe
-
Size
150KB
-
MD5
432bdfd268e5f8c57ad859669149d924
-
SHA1
dfbcd2038f0856770130d35fc4645b29e670ac98
-
SHA256
e71a2d1b15e9669405eccba8d23c9cb488fe246ddb82e0b431be4afe8c24df11
-
SHA512
77e38862e3b6ca27845ea99430a441e623346a2adb1bda8c3c92c12bdd5c97373216ec1f05b57ef44242b91e32485247aea818c94f75e323931a78cbe73a9f6d
-
SSDEEP
3072:BOHtyqyXRlSg3t72U/4N1DpgnAJ0CDhE7G:3h8g3ty9NZ2nAtD
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\G: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\X: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\W: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\V: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\O: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\J: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\T: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\R: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\P: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\Q: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\N: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\K: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\Z: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\Y: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\U: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\H: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\E: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\S: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\L: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened (read-only) \??\I: 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened for modification C:\autorun.inf 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2708 2840 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2840 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2708 2840 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe 29 PID 2840 wrote to memory of 2708 2840 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe 29 PID 2840 wrote to memory of 2708 2840 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe 29 PID 2840 wrote to memory of 2708 2840 432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\432bdfd268e5f8c57ad859669149d924_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 5402⤵
- Program crash
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD58ba404e90194c38541e324657e72f74c
SHA1ad9fda28f95b7747579a7fbb8a18e1d1e6311a49
SHA2568145e4c62390f9c55343cc6dadb790dc2cb9463c4f578fa57bf43f12c4720340
SHA5121f594ebb6b970c9cb86b97d642351106a52db407c6e90db7391b50e97a1136e5ba13aeec66c9b985192c377d8c5c70d3746a00f37bcc83855fea316cf8d82362
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
149KB
MD51cd3fee327a5e50fbd474c27f6fdd70a
SHA1c27b81267d6050b9f2887ec8b8b42f2b80522b55
SHA256ccf11ef3637b4977b17104c2be25fb71ec45f44560b6636b1640a0bbe73bffca
SHA512f76931afecd99ebe16975c408a56dd60a7ee1e05fb1289bd1c09f522010476bad5936a0e4790dc3bb4033de4ee4c0f32ff7c008652bc6df6abf4552608ab5aab
-
Filesize
149KB
MD54636950e3e042df9629b2f70dfd4c3bf
SHA1728d67647fe57387f2d49256d7e9588687738ce2
SHA2563a88501ff88691aa62531c9316a2e405bd3e7455a80f00355e49bcbce067f4ed
SHA51218ad95215ecd915b1457e3ba46e41db54da482858dfba8b2bc5885ffebb8868721e7289813acd7bd5321a0483f8b773672cfc2a8f14c9c87a41bcc22f72843f9