Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe
-
Size
6.3MB
-
MD5
8ca5f31b1c1df08391abb584a114c3e2
-
SHA1
78eeee6399ae136f4ee5a35a3062a34cbf8b11b2
-
SHA256
1a84c5effd0bcef8e2a4311e2641b0ba5804cd78a04ee553446ee1a62d2ed870
-
SHA512
5392de044c6146b9f8eee3faad8a29a22196eacda989e40e61bcd0feb2352884f00392fb2eb9583eb70fec54911dc9cc7d17f3cf272669aeeafc19c11b5fab48
-
SSDEEP
98304:7/F82+pJBGHe+593g9R2YQQlWXCmLzODxzv8/gIY6OkWBSTxba2i5XP:VwJB29Qv7QQlYAd6yBqxO1
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\U: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\E: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\G: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\H: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\K: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\L: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\M: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\V: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\W: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\J: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\Q: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\S: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\Y: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\Z: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\N: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\O: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\P: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\I: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\T: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe File opened (read-only) \??\X: 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe 300 8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ca5f31b1c1df08391abb584a114c3e2_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:300