Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe
-
Size
226KB
-
MD5
9fd1e73df5506f0713084a8d0b1ab3bc
-
SHA1
8f8a3a2720cbe3d46a0ac113f8e27c048697986e
-
SHA256
6286029b9ccc01e84ab8d7afbac5141a32c3ab44895f17054a186666fbd83220
-
SHA512
c81a1ae30a60a1a99f95c24e45d2a39522080a87ca6be9e0825e027718739dedfd33baabb23e6e69b23f586e1dc55362fbb9110487c9daed1fb9004a44336698
-
SSDEEP
3072:hhPeTUDv6sqVEZWbRF7jmXPizMHSyxzpYKuNvC+czAx8gRKehSFaQaqUJXJ6U9xr:nnSsqVcWbL+fiI9Y9a+czAxbCNCr
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1916 dplaysvr.exe -
Loads dropped DLL 2 IoCs
pid Process 3068 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe 1916 dplaysvr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dplaysvr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1916 dplaysvr.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3068 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe 1916 dplaysvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1916 3068 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1916 3068 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1916 3068 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1916 3068 9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\9fd1e73df5506f0713084a8d0b1ab3bc_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1916
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- System Location Discovery: System Language Discovery
PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5b5a19bf6451659da9904e5498bd07e65
SHA17720652d79442998cce9eb66987151ee4c36c5af
SHA256a77ef1959c358480156162fd4012271a825613b09129d172ac26ed7d9d1f070b
SHA5126710e32a206942a13f06005c52669b01e265e3b9b8c86790b1703741f26cc071f609202e21ab7ccb34a64c7225b0f95db25717d4da4546202d8a01d82fab7b6f
-
Filesize
51KB
MD5026595cc3cfe89b58fbfb8864a79daf8
SHA1cdfb4d84eedc48f8c6d929d4eb222dbb1a8d5ebf
SHA25655a0911c9b7e10eefce40ae76b75f5fd556ea585b5f7bd7ad0aa381f81203065
SHA5129f2338cbaeea6cb148a163ac1ba73f51eb4f2b09ad163f14e6fdb3a679e47f4bcbb9ad413fbc3844c57fde2aa67548948aeffc32499557fe27695d1e1954b0d3
-
Filesize
882B
MD54049190d921e21ce622e8d7948ad0628
SHA1a9e441f2a373fe2c529cdcbef540de0a55aef7f6
SHA25629a86b660744bc389864b1253b9d8c26ab47058b86d1ea7c0d5b4c3b934cdc22
SHA512b1699acac56dbdfc582127c97f3f2893f65d0c5bc074cf1e84cc5c1b01e79181c6b8b712748667d9b9d8164ffdb0838f7a65c2a3be1938f833eeefc90627c3bd