Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 20:32
Behavioral task
behavioral1
Sample
0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe
-
Size
92KB
-
MD5
0076e38ce4e63a212d9e1e2e53e19f12
-
SHA1
4585aa54d71ca227f83ec52dc5e87defc4d005f0
-
SHA256
7a09bb011ae01115faf3ffdfc98b18e3f342decde9bbc345bae35b8152fa0afc
-
SHA512
69525a4e7b81c65378027b49e3b3870616e2a185a91403e5d6ec33d67ae8a8b319fe98da271ee91303d9e794db66ac8124a37118cfe0fdbf5bd7f927e64ba493
-
SSDEEP
1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSnrHIMm5iZbJUP7L++E4/:5JjcF8KfCOcjk+guPVjSnrGwM6x4/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3112-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/files/0x0007000000023501-6.dat upx behavioral2/memory/3112-33-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\illegal preteen porn anal fisting.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy blonde tranny in pantyhose.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\keyhole unexpected pleasure.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\aimcracker.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Norton antivirus 2002.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot hungry sluts sucking cum for a line of coke.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cum hungry teen in action.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy babe drinking hot jizz load.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\honie with a ka-boom hot ass and delicious cunt.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute petite amateur girl spreading her snatch.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\amateur getting off in the mirror.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\asian studys how to strip.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\yahoo cracker.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot shemale stripping bare.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two sexy blondes share a cock.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\large lesbo sluts in bondage.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Jenna Jamison Dildo Humping.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\horny teen waking up with her pink pussy spread.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\pamela anderson nude.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\gangbang tryout with young slut and two studs.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute teen with her hole spread wide open.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot mature blonde in stockings.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\brazilian supermodel adriana lima.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cunt licking in pool.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - shower scene.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\aimhacker.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\anastasia nude.exe 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\teen taking off her panties outdoors.mpg.pif 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0076e38ce4e63a212d9e1e2e53e19f12_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e90028bd4306935716534efda8c6a91b
SHA1a4533db194553d36b98b8631080721af21746fa8
SHA256c806b15674a2280ef6732fc062003579cc70988b6a3b88225046b36679e8dc66
SHA512446bef5ba53669cd9bb69ec188f7f51a1aee3b98dff028a6096ff73d43db39e0807c30dbe53c65f2c60ba278e1ce2477a3d776c23cc7996cba5d8c80e69fa3ee