Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe
-
Size
126KB
-
MD5
8a0af8ab9cf89b2d660bff560c5f5f46
-
SHA1
76d5be5818045b73eec6bcda3f5d2b3c33d86cda
-
SHA256
1efcb8ddb6246637001b794cb8bfe43da0744576ee9ab4b8f2419e46ca272587
-
SHA512
4cfb004302e8c9d17d9d190bc822a48a17b5fb9af96dc3c092a22673b675d5e07ee394afd7391db0582e704564c6dce8434e0c074d9889cbafae5719f0811f69
-
SSDEEP
1536:pTWhwiiehaL5o7F4iKEFXvx9oFqWGVYL4442N:pEvrwL5oJ/XUdb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1848 cmd.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1600 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 WINWORD.EXE 1600 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1600 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 31 PID 2460 wrote to memory of 1600 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 31 PID 2460 wrote to memory of 1600 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 31 PID 2460 wrote to memory of 1600 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 31 PID 2460 wrote to memory of 1848 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 32 PID 2460 wrote to memory of 1848 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 32 PID 2460 wrote to memory of 1848 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 32 PID 2460 wrote to memory of 1848 2460 8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe 32 PID 1600 wrote to memory of 2656 1600 WINWORD.EXE 34 PID 1600 wrote to memory of 2656 1600 WINWORD.EXE 34 PID 1600 wrote to memory of 2656 1600 WINWORD.EXE 34 PID 1600 wrote to memory of 2656 1600 WINWORD.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.doc"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD514d89b01e02b983200236870d838a294
SHA13bf0cc8234faa89f16cf1484e3f94c7006ae550d
SHA256785bac524e4abb800df4e6341ee234558a9b46f31d8f675370566c2e7a92cf2e
SHA5123d8b6fb4940a1f35ea7c972ee0a9094b43363245d9f3e860f3feaea760de73beea6e536364c5fd0152cd3b8cf55d0756e2345e0c34e4c443d98645d7293ee4fe
-
Filesize
19KB
MD59ee0c5e8917653b544d2d171076bc46b
SHA1d175671fbf0a64c947dd57b3d20a4cee42ed299b
SHA2560c24638aa565746cc0f71ffb38002a4865cd14924fd9536c622074208299a94a
SHA51257ea08459cabeb9e91255beb820e3ffd916c0f3926a92c3c8cbfbd3bdeb0fb94ca0076908da704041852607a4473c3a7179df73069c46336ce922d0759172441