Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe
-
Size
219KB
-
MD5
a46551c1bdab3a0c923503e7fa16778f
-
SHA1
602813cb29471b62dcd8da065a7fa872a523a6d5
-
SHA256
1e0ed721040c2e3d63c845ac6d932eff5162d3a6eb24689e687cae30985951d9
-
SHA512
e7185b53674002f742810d4cb0f858f3e0f8c65fc89ae62ed049d2dddc61b43c3e5a7f722843e08d672c953ef88bfc7afa453af8a17d71925b85182491b5d7c3
-
SSDEEP
3072:Zk6/SAnzOr3uP7qoArkUh//ko1ccfCTR9gjOIA4pWC:C6/zKiPUNT1cACTfgjd1AC
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
***098***
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2356 qs1wce2u.bxz -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\Realtek A-350 Adapter = "C:\\Program Files\\realtek-a350.exe" a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\realtek-a350.exe a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe File opened for modification C:\Program Files\realtek-a350.exe a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qs1wce2u.bxz -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2124 a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 qs1wce2u.bxz -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2356 2124 a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2356 2124 a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2356 2124 a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2356 2124 a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a46551c1bdab3a0c923503e7fa16778f_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\qs1wce2u.bxzC:\Users\Admin\AppData\Local\Temp\\qs1wce2u.bxz2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD5ee3ecec6bfddfceb2f7f30d91d41e360
SHA1af568e09c2b6851b01e7e2002ffb76926bdf5502
SHA25679ab62fbbd993ae858f19a6a7096c16979988dda150684bb3f8c6d380fee1ba3
SHA512cae873d4a169067495c8981afedcb461d8afdf296ae7bbab58d4a7e64a5eb5040d911691acb82901dedb3bdc72e78ed8ce2b3843c890ee8d9ac2624c7211c76f