Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 13:27
Behavioral task
behavioral1
Sample
863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
-
Size
414KB
-
MD5
863b5d2c84f4ee7889191be12039c321
-
SHA1
20315e8c53e1ffcb950c74a671f5f3b35348f490
-
SHA256
e1f89fdd0193c44ecb6562424851fe9abad4178f40d9dd3964dbcb69f0a2e7ff
-
SHA512
4fb17aa932d48c5ca5b67baaff6e1bef53ca46263aee930a003eeaa89e49307eecf158820bba59de01406dc151cd6d4a832b50f4ed774416462ebe9f8a15c779
-
SSDEEP
3072:EmVW8iTX/3RflkXq1+0cxxsWEL02fXcIp08Moe9DESvC:VM7jJlLxYTHYZM1A
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2572-3-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/files/0x000a000000018671-5.dat upx behavioral1/memory/2572-34-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\cute teen with her hole spread wide open.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\super sexy blonde showing her pink.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hotmailhacker.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Website Hacker.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\aol password cracker.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\dedicated honie giving dude a helping hand and head.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot babe getting pussy eaten by horny girlfriend.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\spying on gals in toilet.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\honie with a ka-boom hot ass and delicious cunt.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two kinky old lezbos snapping the whip.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\blonde on couch gettin tight anal fucking.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\fat grannies action.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\leggy babe posing in pink panties.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Choke on cum (sodomy, rape).mpg.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hardcored blonde mature.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy star kate hudson nude.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\divx pro.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot girls who like cock but eat lots of pussy.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\old fucker punishing teeny.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\blonde beauty ass fucked.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Winzip.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babes with an assortment of delicious big juggs.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\fine babe spreading sweet ass and luscious cunt.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\movie of mom who whip hot ass on daughter's big cock lover.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\gorgious babe who quit school to model pretty pink.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\win2k serial.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babe with peach shape pussy that needs it bitten.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\dude getting off in lover's mouth at party.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\shanks who serve up smelly pootang.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\msncracker.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\brunette fucking in bedroom with boyfriend.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\couple babes getting off with well hung dude.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD562183c3e4ef63000d58f8aed24287fcf
SHA1905cafc17413dbf252a6f61ea801eb0b431af515
SHA256f2052dffaf20dfc958d54812716fe7fa89056ea0f40063898754f4217de9b511
SHA51234771071bb0d5280f15430d5fa8936b6687a6ba885145c72f03b93ec51e1d3a65a828863f2a50425b60f1dd63fd517be2c44beefb515be7b892a942add272ac6