Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe
-
Size
152KB
-
MD5
490e2ff9d485fd68d1c439697b7567fb
-
SHA1
8afdf999eb36fb49f23730133ac467a93e169a18
-
SHA256
85fc0e966a77d39b21c04b3a2b3179fd283606ad06c3a3776e9e1c9a6f862fbb
-
SHA512
dff3bfcae07ca91d3693fc87202e2a9a34ced614149c0ca019b013d8284318a7e860a44597829580e103d78cf460e3a6a6fa90a1ccff5f6ae5d675bad508b50b
-
SSDEEP
3072:h72DTjMbh1+u7jb2WLyYAfozPCO9Jk7Np8rNmxpmYCEoZx:F2vaDjb2vq+Bp8rNqpZCEob
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\O: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\L: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\K: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\Z: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\Y: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\X: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\U: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\G: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\E: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\R: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\N: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\M: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\I: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\J: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\V: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\T: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\S: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\Q: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\W: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened (read-only) \??\H: 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\autorun.inf 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\OUTLOOK.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\GROOVE.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\INFOPATH.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSACCESS.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSPUB.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\OIS.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\ONENOTE.EXE 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log winword.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2976 2304 WerFault.exe 30 -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2760 winword.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 winword.exe 2760 winword.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2760 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2760 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2760 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2760 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2976 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 32 PID 2304 wrote to memory of 2976 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 32 PID 2304 wrote to memory of 2976 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 32 PID 2304 wrote to memory of 2976 2304 490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe 32 PID 2760 wrote to memory of 1808 2760 winword.exe 34 PID 2760 wrote to memory of 1808 2760 winword.exe 34 PID 2760 wrote to memory of 1808 2760 winword.exe 34 PID 2760 wrote to memory of 1808 2760 winword.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\490e2ff9d485fd68d1c439697b7567fb_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 3122⤵
- Program crash
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD58d355473fbe14bb2d3241edb57492b65
SHA127aa97bbab0b1e72876016eed7b49c67eb81d829
SHA256a4cdbfea09da0c102af5463e00d93dabf24252c1dbef4f6c15b402d8ebdb3349
SHA5124cfc631e740d36fbc47f0ab9038431f7e877640ffe692de138b8fc9ca7db55fd608e06b6e5930f5675bbc9c4fba4257a4a1e12594f7dac73732efa7f696fc916
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
151KB
MD5ecaae103490278289cc1b16f48351fc8
SHA1e899882b8b49f667080ccac05468374467459734
SHA256c669b7df05e1b11bbc091da412a82ebd780821f209d438ed4cf31e86159297ea
SHA512cbddc909ebf23030e79205ec29944f99432dc011af5695d2c908ede1f78feb8e1ce9567f28d2430ae75ac47771f6095a60660fed33cf43c7da3c5076a06c937a
-
Filesize
152KB
MD5546fcf5b22d5edd1ca7ac3c4cb3480e0
SHA12439ad94562de47e014f9ce217ff8194ef5c29b5
SHA256f22617117bbb85cdd9167af492328a0436821528d34a9658d79fb6fd8ef76b59
SHA5128dd2ad82be6c1583990327888e07775e1f6c5a8810ae0cd10b39d3f93a9eb26ff60d52f1ad6cf80541e5173668ca7e68a91e4d3428d4c0d79af54707fa704a0b