Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe
-
Size
526KB
-
MD5
94c2ea8ace02db25b35b3ca26e8e3968
-
SHA1
17f8f85097fd93ff54e9f10d96b0a49dd39ace89
-
SHA256
bbd6f439e5e43a247da9983615ab4938558a2ddf23ac2fcf51de74482e296341
-
SHA512
abcbed11548d1b9e8e5f3c5582c1342292ce650a4620080774f19b4133eb7447c44aed032b2688a3ce5ce48e4edde8ae9ec513e6781903648d4746b53ac775de
-
SSDEEP
6144:d9jzLW39MJFSWV9x/5IMyd62jvwAVo7RBcJmDC7DGDpDmDbzy4VhRGumJUzXshtz:7Pjzd5I02jvwA+c3y4NGum+q4Ho
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3324 dlllhost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\dlllhost.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\logs.txt dlllhost.exe File opened for modification C:\WINDOWS\SysWOW64\logs.txt dlllhost.exe File created C:\WINDOWS\SysWOW64\dlllhost.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files\eMule\Incoming\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Kazaa\My Shared Folder\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Ares\My Shared Folder\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Warez P2P Client\My Shared Folder\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\iMesh\iMesh5\Data\Playlists\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\eDonkey2000\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Grokster\My Grokster\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\ICQ\shared files\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Rapigator\Share\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\LimeWire\Shared\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Kazaa Lite\My Shared Folder\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Swaptor\Download\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\WinMX\Shared\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Overnet\incoming\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\appleJuice\incoming\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Shareaza\Downloads\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Morpheus\My Shared Folder\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Bearshare\Shared\kespersky Keys Generator.exee 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Kazaa Lite K++\My Shared Folder\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Tesla\Files\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe File created C:\Program Files\Gnucleus\Downloads\idm.exe 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlllhost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dlllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dlllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3324 dlllhost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 3324 dlllhost.exe 3324 dlllhost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1748 wrote to memory of 3324 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 85 PID 1748 wrote to memory of 3324 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 85 PID 1748 wrote to memory of 3324 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 85 PID 1748 wrote to memory of 2352 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 88 PID 1748 wrote to memory of 2352 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 88 PID 1748 wrote to memory of 2352 1748 94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94c2ea8ace02db25b35b3ca26e8e3968_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\WINDOWS\SysWOW64\dlllhost.exeC:\WINDOWS\system32\dlllhost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windowsrunner.bat2⤵
- System Location Discovery: System Language Discovery
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD594c2ea8ace02db25b35b3ca26e8e3968
SHA117f8f85097fd93ff54e9f10d96b0a49dd39ace89
SHA256bbd6f439e5e43a247da9983615ab4938558a2ddf23ac2fcf51de74482e296341
SHA512abcbed11548d1b9e8e5f3c5582c1342292ce650a4620080774f19b4133eb7447c44aed032b2688a3ce5ce48e4edde8ae9ec513e6781903648d4746b53ac775de
-
Filesize
27B
MD5709191d3408d179db0aff8bbbca7e249
SHA1407ef9fff2bbeb2b85738a39c8bbbaa2dcf9b2fd
SHA256ed8f9de65ce3dc77975224b9d88a38dc6f211b6d9bd9ac1659260f92232fc109
SHA512f7b4087507e3fcf834da069cb97db034be549af8d78874166e990a164f7f9a39baa6492906ac56c3c23d0e2a11d8a2634e1c455ac2facded7c8011244f1e1529
-
Filesize
92B
MD575adeec16e9365d94f540630ef7c10b6
SHA1f1a583233d08e0988ec93b37ebedb6dc1aec1c97
SHA2565585ac12a3e277c17b7f2894cfaf39f4213e858e0bc510d34574e6aac39bdeaf
SHA512461160dcac41e214ff1347820195e26fca908d03b63d51e6b82b51f596114a9767cf5dda5e9140171bc57f1bb89687e5fcce211deef536241c6bb4bb2772223c