Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe
-
Size
175KB
-
MD5
66c96f2681a0979f28995f9eb864f715
-
SHA1
e227cf15087bf98c588de3ee1b38c450b7b259b1
-
SHA256
ca951f7c540941ee4be8a9284d30150ecef411107a0e62249a5f9954c1297ca5
-
SHA512
664a667f51d7699f1b66091d5674b495b7c7bb6913b821d7c8d642ef2b2403611b27abf6c49fa3527347964512d61793901d8dbd1ed859eba9fb2e8834a9e161
-
SSDEEP
3072:mMkcPTF6QV8HNBBYiTpXEq7ndNiDDdwcwqKSncs4lzBAJ2BP+z1Sa2:5kcRwHNBBYsrnLiDDKTs4lmJ2BP+hSa2
Malware Config
Signatures
-
Renames multiple (175) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1832 Logo1_.exe 2504 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2892 cmd.exe 2892 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\bin\rmiregistry.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe.Exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\default-browser-agent.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Logo1_.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe.Exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\policytool.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\keytool.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\uninstall\rundl132.exe 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe File created C:\Windows\Logo1_.exe 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe File opened for modification C:\Windows\uninstall\rundl132.exe Logo1_.exe File created C:\Windows\RichDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe 1832 Logo1_.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2760 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2760 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2760 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2760 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 30 PID 2760 wrote to memory of 2736 2760 net.exe 32 PID 2760 wrote to memory of 2736 2760 net.exe 32 PID 2760 wrote to memory of 2736 2760 net.exe 32 PID 2760 wrote to memory of 2736 2760 net.exe 32 PID 2692 wrote to memory of 2892 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2892 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2892 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 33 PID 2692 wrote to memory of 2892 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 33 PID 2692 wrote to memory of 1832 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 35 PID 2692 wrote to memory of 1832 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 35 PID 2692 wrote to memory of 1832 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 35 PID 2692 wrote to memory of 1832 2692 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 35 PID 2892 wrote to memory of 2504 2892 cmd.exe 36 PID 2892 wrote to memory of 2504 2892 cmd.exe 36 PID 2892 wrote to memory of 2504 2892 cmd.exe 36 PID 2892 wrote to memory of 2504 2892 cmd.exe 36 PID 2504 wrote to memory of 2040 2504 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 37 PID 2504 wrote to memory of 2040 2504 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 37 PID 2504 wrote to memory of 2040 2504 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 37 PID 2504 wrote to memory of 2040 2504 66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe 37 PID 1832 wrote to memory of 2464 1832 Logo1_.exe 38 PID 1832 wrote to memory of 2464 1832 Logo1_.exe 38 PID 1832 wrote to memory of 2464 1832 Logo1_.exe 38 PID 1832 wrote to memory of 2464 1832 Logo1_.exe 38 PID 2464 wrote to memory of 2848 2464 net.exe 40 PID 2464 wrote to memory of 2848 2464 net.exe 40 PID 2464 wrote to memory of 2848 2464 net.exe 40 PID 2464 wrote to memory of 2848 2464 net.exe 40 PID 1832 wrote to memory of 1612 1832 Logo1_.exe 41 PID 1832 wrote to memory of 1612 1832 Logo1_.exe 41 PID 1832 wrote to memory of 1612 1832 Logo1_.exe 41 PID 1832 wrote to memory of 1612 1832 Logo1_.exe 41 PID 1612 wrote to memory of 816 1612 net.exe 43 PID 1612 wrote to memory of 816 1612 net.exe 43 PID 1612 wrote to memory of 816 1612 net.exe 43 PID 1612 wrote to memory of 816 1612 net.exe 43 PID 1832 wrote to memory of 1424 1832 Logo1_.exe 21 PID 1832 wrote to memory of 1424 1832 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a51B8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66c96f2681a0979f28995f9eb864f715_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Tencent\QQ\run.vbs"5⤵PID:2040
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:816
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD553d942f5744323de892bd5de39e99743
SHA18aa68e4e1fdf38ca3a64d13c0981628d1e3c9f12
SHA256a40cdb9173ec67a90f7464dc1b306f9796fa8526577f65c7f7c12cb4a1cc94b0
SHA512ae917cf0b1dbbd8c261cbb4ad14edac61260257cb385256e0773e22ebfae2357162ccbdda5ef54e60d7de9db62799d7450c1268b1aa27abdcd886b5b7773dd5a
-
Filesize
614B
MD5d46a8141e82d2b7467d94e08f8893316
SHA1ccc952dcf1db4f6f34ce90872e9a9727880cd970
SHA25641364cac5b9af02fa46d85eb569ff0feeb4f5d506acc65b12af7ac7444d3b372
SHA512ad1dfeb6fb5ecaaf4ee78d5a1ff61d0332d90e2ebba04a3894f80e47c0d07cbea7ee4dcb7763c07cf954825072c3f8a3563e9e4fb19762b087d071530030d8de
-
Filesize
117KB
MD5fc89a590ced260129e180233dba8c6f4
SHA13715f8d0d08722ac9807c57c2cb4f9040a7ac075
SHA2563916f17224ed64c3dc745be2b4d686079a30bfc00ff81ce0be602ccd39f377a9
SHA512b5d4690325757cc66475babbc37b68a3b039df3c7904dd89f97af768834c99c9f8d1a354d7dca716349d92932c271e5c453b9cad6502d81fbe12afc70c42a942
-
Filesize
58KB
MD5ad6d481e21d8f81beeac72f95ab2b36f
SHA13d06f66d0c501ec607c626bba1667c6a42af8d42
SHA256291e014b7d8870b9821c65c86438e03e464fed0d7131b5c97987cf0e8d3f2881
SHA512207b782d9ffb58394ae00ad4862c959e1a42b645bb25e827612fe9a06006b95b9a4edf2d99046792396b69a699e21f16520f5122e9c2cbbeb77ba26fc8f929eb
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f