Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe
-
Size
284KB
-
MD5
69fb9699229e3172e51aa56e6ac63bfc
-
SHA1
c1632a7cf2ce2a895f10a5820c90652bafacdaa1
-
SHA256
b8cffe940cdc0eea0122970afc3c5547f8cab39a04bc88266f31977351d1b9de
-
SHA512
930b28f264d3493d012d4d2cba403bfc7fd1943cfa542b2d24a89f10dd717f2b1bd8317a557a3a4bddf62b91d95a2c6bef06c1f801e50b5a17611945218a8ed4
-
SSDEEP
6144:k498bhJjcAocNirBX0zKclwA7xWex8k+QxHahdhV+Q1:KcHfGlT8b+HahZ+Q
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\o9t23vw8q1.sys 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\o9t23vw8q1.sys 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\63t3qhpv.sys 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\63t3qhpv.sys 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\63t3qhpv\ImagePath = "system32\\drivers\\63t3qhpv.sys" 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\o9t23vw8q1\ImagePath = "system32\\drivers\\o9t23vw8q1.sys" 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\5ik4sr.dll 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\5ik4sr.dll 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69fb9699229e3172e51aa56e6ac63bfc_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2328