Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 10:38

General

  • Target

    8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe

  • Size

    126KB

  • MD5

    8a0af8ab9cf89b2d660bff560c5f5f46

  • SHA1

    76d5be5818045b73eec6bcda3f5d2b3c33d86cda

  • SHA256

    1efcb8ddb6246637001b794cb8bfe43da0744576ee9ab4b8f2419e46ca272587

  • SHA512

    4cfb004302e8c9d17d9d190bc822a48a17b5fb9af96dc3c092a22673b675d5e07ee394afd7391db0582e704564c6dce8434e0c074d9889cbafae5719f0811f69

  • SSDEEP

    1536:pTWhwiiehaL5o7F4iKEFXvx9oFqWGVYL4442N:pEvrwL5oJ/XUdb

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe"
    1⤵
    • Modifies system executable filetype association
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.doc"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2656
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.exe"
        2⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:1848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8a0af8ab9cf89b2d660bff560c5f5f46_JaffaCakes118.doc

      Filesize

      64KB

      MD5

      14d89b01e02b983200236870d838a294

      SHA1

      3bf0cc8234faa89f16cf1484e3f94c7006ae550d

      SHA256

      785bac524e4abb800df4e6341ee234558a9b46f31d8f675370566c2e7a92cf2e

      SHA512

      3d8b6fb4940a1f35ea7c972ee0a9094b43363245d9f3e860f3feaea760de73beea6e536364c5fd0152cd3b8cf55d0756e2345e0c34e4c443d98645d7293ee4fe

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      9ee0c5e8917653b544d2d171076bc46b

      SHA1

      d175671fbf0a64c947dd57b3d20a4cee42ed299b

      SHA256

      0c24638aa565746cc0f71ffb38002a4865cd14924fd9536c622074208299a94a

      SHA512

      57ea08459cabeb9e91255beb820e3ffd916c0f3926a92c3c8cbfbd3bdeb0fb94ca0076908da704041852607a4473c3a7179df73069c46336ce922d0759172441

    • memory/1600-6-0x000000002F021000-0x000000002F022000-memory.dmp

      Filesize

      4KB

    • memory/1600-7-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1600-8-0x00000000718ED000-0x00000000718F8000-memory.dmp

      Filesize

      44KB

    • memory/1600-16-0x00000000718ED000-0x00000000718F8000-memory.dmp

      Filesize

      44KB

    • memory/1600-31-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB