Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe
-
Size
102KB
-
MD5
8dbf8f1d5aea16a940a6d8d1de03c945
-
SHA1
f0fdda337b3f9e414ed4b84a8af54c07209ccea5
-
SHA256
fd434f3356c0d62c06f6aced1623dc7daac90a8f78b21455f2ef559e1b039410
-
SHA512
0b001aeed21ae2ee2a355bc912c2d0bcf8a709584b08e3fdc41b84332b6311ea4dcf12abfae14237d00ff52f42c65304a14982b74396988898c8edbbd27d36e3
-
SSDEEP
3072:zftffjmNoxlfP2d67tPmFsp2MdYDluW1Sgs10MtNXFokMDvi:DVfjmNn/6EluW1Psv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4276 Logo1_.exe 1296 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_2019.305.632.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\pages\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\Views\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.371\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\DAO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pl-pl\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe File created C:\Windows\Logo1_.exe 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe 4276 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1840 wrote to memory of 208 1840 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe 84 PID 1840 wrote to memory of 208 1840 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe 84 PID 1840 wrote to memory of 208 1840 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe 84 PID 1840 wrote to memory of 4276 1840 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe 85 PID 1840 wrote to memory of 4276 1840 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe 85 PID 1840 wrote to memory of 4276 1840 8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe 85 PID 4276 wrote to memory of 4380 4276 Logo1_.exe 87 PID 4276 wrote to memory of 4380 4276 Logo1_.exe 87 PID 4276 wrote to memory of 4380 4276 Logo1_.exe 87 PID 4380 wrote to memory of 3940 4380 net.exe 89 PID 4380 wrote to memory of 3940 4380 net.exe 89 PID 4380 wrote to memory of 3940 4380 net.exe 89 PID 208 wrote to memory of 1296 208 cmd.exe 90 PID 208 wrote to memory of 1296 208 cmd.exe 90 PID 208 wrote to memory of 1296 208 cmd.exe 90 PID 4276 wrote to memory of 3424 4276 Logo1_.exe 55 PID 4276 wrote to memory of 3424 4276 Logo1_.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9C01.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8dbf8f1d5aea16a940a6d8d1de03c945_JaffaCakes118.exe"4⤵
- Executes dropped EXE
PID:1296
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5d266bf36f1ce0dcfa79f3a7e8daae38a
SHA1c463ca34c2f1434e827d6f855d7ab144630f8b88
SHA256de500a2e97e8f587bf574e809590af24e53c18ea77012335740340d0bbd7c267
SHA512fe37f23a33116b4325004e40a40990fced5e7e7d925f9a8bd2279b3f4995d5080fc1b876d332eac260d2c3a4d0c8ad631f3e045300245475b290d5dfac810911
-
Filesize
570KB
MD52e0e37544c0d434093d63e04a4602859
SHA1312703a46b2936810047db3cd5b1f45bb337a57c
SHA2568a44e191d00efe3ccf65fb2a4ebef7ce273c691d93d3df9d9de5ee371441ea58
SHA5123728f0cb00ebad8473723478aa033571bd4b482fdc8b043a30f65ae99a69cfc7c612d66180b7b13ef69bc49c5b1b01a2af8797560bfe251e1f578f5b767687ab
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD57c0581e2c34a99e0e6b7b63deb7540d8
SHA12ad688b178321284f2eab56ad02ef1d32e7ea46f
SHA256200d8896a4cf3d442567696ff425b2aeca8b87428173337c4f5b9022ae0d6ab0
SHA5124e65033131dd98ef1eb39d5da1c3a92b8d4c3ca083edb3db7bf9f555e57285f9f5c63bdc4d24cc5aa63312edd216ebc74c0a7f74ed38783e27998a2c013a496e
-
Filesize
614B
MD5e86a2defef2459ffec5a8b1f4442d7c2
SHA11dea36d5142b9eb3a0292be74ad4a88b57283d50
SHA256cc2539fad16b18da41f8b60635619d844093d2138d5f1ef4f1367f7ea65b5244
SHA512e9e88ebbd40489c724d6128646d60450bbfe4d3002b1eda8c3c28e47bbda0f329cc7d6b820d65be169809b633d5ab3afae1c867b19dd0e5cc50263899ee924b0
-
Filesize
76KB
MD5ab74aa8defc1ca82759788a55b673629
SHA164eaa5f6cc51635124674c4439ac34f7dd46bc13
SHA256f6888f5a134294c2ed1be85357f1a7bf2eee9653251aa63271bb6e570caffc6a
SHA512b54507a8d5086eb293bdc452b131cab1e5f3d9c92429b5d22ed82ff14386038eb903d1babdea95c16134771906329f40fcfbf3aad4b7fccddd0a417b147718b3
-
Filesize
26KB
MD55d629e10931355c7c3664661f02486b8
SHA14ee30faf056a32b6f83fa902f7b68d9ffd9c0de1
SHA2565ef46780ddef96df9b110efb96209c85b898b54584af78bacd6986c5c5be15ab
SHA51298a82ec1dbe3b3ac7b8751334e24a9952b30b5672d7c767116fbd0bf5728ee70eb6fab73ac9ae0c1b66bf537f03a37c8354534743102a0b29d8f55032c340bfa
-
Filesize
9B
MD51d7eff79e14bea77e992f25202a6decc
SHA12481953494e9f17a5d9c8186bac1e89c460da06b
SHA2560bc3f26881fb44793cd3a989e616ce2b45848152d57eb4a38fd5f06df63f0a9a
SHA512e9cffe2ce1cc689a1a0c9bee4da9e0ab90625931729257893780b13eb9060ee26bf373c87c0ae33e3fcdc3e8614d415ac00fe57fd7f1fb4908212cc145c8d9ad