Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 13:27
Behavioral task
behavioral1
Sample
863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
-
Size
414KB
-
MD5
863b5d2c84f4ee7889191be12039c321
-
SHA1
20315e8c53e1ffcb950c74a671f5f3b35348f490
-
SHA256
e1f89fdd0193c44ecb6562424851fe9abad4178f40d9dd3964dbcb69f0a2e7ff
-
SHA512
4fb17aa932d48c5ca5b67baaff6e1bef53ca46263aee930a003eeaa89e49307eecf158820bba59de01406dc151cd6d4a832b50f4ed774416462ebe9f8a15c779
-
SSDEEP
3072:EmVW8iTX/3RflkXq1+0cxxsWEL02fXcIp08Moe9DESvC:VM7jJlLxYTHYZM1A
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1960-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/files/0x00070000000234b7-6.dat upx behavioral2/memory/1960-34-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\this really wild insane groupsex.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Another bang bus victim forced rape sex cum.mpg.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute honie spreading flawless ass and juicy twat.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cum hungry slut accepting goop.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\some twink ass rippers.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cunt licking in pool.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute girl giving head.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot actress heather graham naked.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\both holes fucked by a massive fucking machin.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\jessica shows us her fat fisting.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\invisible IP.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\nice girl showing her tits for extra money.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Free Porn.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babes getting their tender little asses corked.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two hot college girl fucking in class.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot butt sex ..unbeliveable.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babes letting dudes assault their furballs.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\naturaly tan babe with gorgous body.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\glamour babe in black stockings.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cool rooster raiding hen house for hot babes, link city.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\ass ripping interracial fuckin.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\teen bisexual mmf threesome.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Cable Modem Uncapper.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babes getting big cocks off with lips.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\brunette fucking in bedroom with boyfriend.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\crazy old man playing young teen.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\brazilian supermodel adriana lima.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy babe drinking hot jizz load.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\a teen with a thick hairy bush.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babes taking turns munching on hot beavers.mpg.pif 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\863b5d2c84f4ee7889191be12039c321_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55c9f696e60d6008236f926c55b879f97
SHA150722c456e9a1b17da126584fa8a7262af506eeb
SHA2564a72b22f827558d057584bf5d60604a18e89800e13076d679b93c25016e021ac
SHA5125d3c4505a45086373ca9f1fc4e5f736ac7576a6e8dea92e2a20aef37828f96a9585cc8dc9d27a3d1de16528579659f85f27768ca47bfbd2dff7eb3ea672c533c