Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe
-
Size
84KB
-
MD5
84f47106db7777e612036fcf9d8d255b
-
SHA1
750f57f22a94fcfeb3b273ea9cb36de7e15799b4
-
SHA256
0b92795e28f11d78d95c3d3ce47418d263733fab0b82d0017ec248f423c71499
-
SHA512
471c8498be8f69657f46c84df1e5a7a8b171a8a74b4eb8cfbb7ec5710178a2a98eb1221b2e4aca3386f2d461c561fd2b8d0ff4e2b38471c9ae32d676a231cf20
-
SSDEEP
1536:ty2e6FyQHo65SOVrRGvmK22TbjmwDs5+L:ty2enQHo65SOB3WPmw8+L
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.TMP\ = "TMP_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\TMP_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\TMP_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.TMP rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\TMP_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\TMP_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\TMP_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\TMP_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2148 84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe 2696 AcroRd32.exe 2696 AcroRd32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1100 2148 84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1100 2148 84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1100 2148 84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1100 2148 84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe 30 PID 1100 wrote to memory of 1748 1100 cmd.exe 32 PID 1100 wrote to memory of 1748 1100 cmd.exe 32 PID 1100 wrote to memory of 1748 1100 cmd.exe 32 PID 1100 wrote to memory of 1748 1100 cmd.exe 32 PID 1100 wrote to memory of 1748 1100 cmd.exe 32 PID 1100 wrote to memory of 1748 1100 cmd.exe 32 PID 1100 wrote to memory of 1748 1100 cmd.exe 32 PID 1748 wrote to memory of 2696 1748 rundll32.exe 34 PID 1748 wrote to memory of 2696 1748 rundll32.exe 34 PID 1748 wrote to memory of 2696 1748 rundll32.exe 34 PID 1748 wrote to memory of 2696 1748 rundll32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84f47106db7777e612036fcf9d8d255b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TMP9660.TMP3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TMP9660.TMP"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD556c03b65d5a97bbc114772172de36849
SHA184f3598b8d20518dca847b0d2d324131c9b77749
SHA256078dce039e69e9b9418db6e23279445a4e7f7754044fa998e6b20cf549f92b92
SHA51207f9e8df4a677132984507bbf4cca5c202dbd56385e4979d4c7cbf95065e245e2435e93409f0ef2d34e9906b6f05966b662ff2469282eb3c83ae88320c30e1ad
-
Filesize
3KB
MD56812d39a036636649e0be30f48094cd1
SHA14108bba739b44858b7f31554400d3ee12cfdb373
SHA256e64fcbf7e13671a8fd3eb6bdd4a9c5bcf2340d2cd4cea92fd635019a84463b3d
SHA512fb4ab9587f9007330d922f60a574656001534a4435f51f1f44c54d81a9bfb9961c5d8f62c3234b3c8ae22297a6ba3c4ee2b2b7d01375ef578aa6715448e8754c