Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe
-
Size
260KB
-
MD5
9586c32fe33b206b8c2581a866aab907
-
SHA1
43df59353cdf933293eac9c938edea40c0d93ac6
-
SHA256
c2af5b117cc3c807c48a2fb45120901ab89b7bdb82b0882065aa12656ef5c638
-
SHA512
227d1fd215ed496067daf264dbdc410330da8be527ebd089ee3a9c2742f49694b7e1e6409a129876e1a32e3dc20b40b0d82a3c209774a905537786a04bead416
-
SSDEEP
6144:Ulw1vZKBR9qBgFJc5GkNLbqDBFqWZFKkFFJc5QBR9qBzw1vZk:UlMkQBmJc5pNbaUebLJc50QBzMa
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Mozilla Firefox = "C:\\WINDOWS\\system32\\firefox.exe" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 28 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\E:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\M:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification F:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\I:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\L:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\M:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\N:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\P:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification C:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\E:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\G:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\H:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\J:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\P:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\G:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\I:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\K:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\O:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created D:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created F:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\H:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\J:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification \??\O:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created C:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification D:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\K:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\L:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created \??\N:\autorun.inf 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\default.htm 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\default_files\ga.js 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\default_files\css.css 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\default_files\top.JPG 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\default_files\css.css 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\default_files\top.JPG 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\firefox.exe 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\default.htm 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\default_files\ga.js 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "C:\\WINDOWS\\system32\\default.htm" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "C:\\WINDOWS\\system32\\default.htm" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "C:\\WINDOWS\\system32\\default.htm" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "C:\\WINDOWS\\system32\\default.htm" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "C:\\WINDOWS\\system32\\default.htm" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "C:\\WINDOWS\\system32\\default.htm" 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3092 9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD56ddfb5dd4352d335c52b35c0fd74ef8f
SHA1884b8d5352d1311151157e0bf58429536e66e525
SHA256de72ca6f107a11aebbc94ef7d015b6d10f1a46b4bf9d3b80a3ca5d47aae67f04
SHA51240214af52fc466580e923d7d1812e05d7a8a14bb88e4f98dfc96d8db52df6a129342fc8c3c8b69fcf1b9b0a4ddad149d0314db17fe4e15dcd2d954826d99447c
-
Filesize
5KB
MD572d6fc61efc8ece2704f4b1e8b07a530
SHA1c46afb6ff6e74dd5d509a55fda74f6dd936db8bc
SHA2564a167e40cb7ef9fa08d71f65da31631353b524c43f1b44c89a34b4fb0a5c11a8
SHA5128adacae90b2d64dd1bf7b22241b4c5a7e458c0215ee5810312077892a25467258cdf69364953de42a94defaa3b5edf16ab4245bdb8e09350f1db123008986b14
-
Filesize
6KB
MD51e8c198ce9ef1f453c2932bcc9a0c70e
SHA1df5d474b9667b9c9f49ec87de2e822e0297b0b5b
SHA2565445c6e6b836a1f38c9e41b948e8c3c965d0149eb55c26a38ad5af0b3672a9f2
SHA51278de4091771250fa139563c9d44fa92fbfbeec1da21ea779c82ad22565398979c218d95b5801d145ab188966ebc610a9970858d73bfb899c788b7ccea58922ab
-
Filesize
20KB
MD5acc15c6f123bbc8d62892ace3c6d8d7f
SHA1d7189f5ff4cc0445422d47759fe0a030efee609a
SHA256c22136a5bc7a62cbd6b88ebe4e321d4f640b0345d1f28ff946f5fe5abacc0cbd
SHA512b916b174343e0017831c6a1cbbf7beaed896c8aab64ad0c5d4790cf7f5785bbe49bbf3b31884a74849de9592606ae85ef521ce3fa144243fd38080b46fe0cd70
-
Filesize
22KB
MD561aff6344059d2455fd72df54c6c383e
SHA1b26480075c75d8e8a08de511c6ac4e6b7294389c
SHA25668acc1c4efea0374bc619b5543eb1b93460f47177ab92ab030aa5fed4481f3e8
SHA512f78e8362950a2812ebb0ce16e3af0dbe556cbc4e325e9cd8f5e33a4028c27c786633829b11ab3f9fffca2cbb2bedd16552e3e884708f82e5e6ee15a695b409d0
-
Filesize
120B
MD51c32c1204746b858602374cb36cdad9c
SHA1e86bb8c935af0fc87db9b9908617ec442bc3d2f8
SHA256e30d9e4e70060b4798b59ca5f5b3cd51c995799b84d0221b201afec264cb24ad
SHA512a99ce65e8899f2f9a7b89106c93f6bfe633e42918658bff57ceed3f4251e77c4860add6b0657a74bc75eadbc317e8927d5cd0bf068f0f068e46ac3812099d5e9