Analysis
-
max time kernel
27s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe
-
Size
30KB
-
MD5
a1a8f1991d36f230365abc97550b746d
-
SHA1
ba95c4316be2816feb0314d054bfce6b307f5f84
-
SHA256
e53987d0184a7bf23f65b912007e1b6377fbc2d4a8ceaae94d9ef583254191db
-
SHA512
5798a13427178438c9c65aacd2bc61e994fe52fc3c4e2eace95d7bcb478d81a15bf547eec83f932fb2f0cc3b99a3045fe1e0ba3001f697458fd3eaf78e587456
-
SSDEEP
768:iy/2a9hc5gJ1QeerFjCO5uS0f1bIiFqOiByB8:F/2a4UaxR5Z+iB08
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\acpiec.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\pcidump.sys a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe -
Loads dropped DLL 12 IoCs
pid Process 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe File opened for modification C:\autorun.inf a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe File created F:\autorun.inf a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe File opened for modification F:\autorun.inf a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\func.dll a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\phpi.dll a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2576 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1840 ipconfig.exe -
Kills process with taskkill 3 IoCs
pid Process 2900 taskkill.exe 1684 taskkill.exe 2752 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe 3036 rundll32.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2900 taskkill.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 3036 rundll32.exe Token: SeDebugPrivilege 3036 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2696 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2696 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2696 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2696 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2684 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2684 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2684 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2684 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2792 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2792 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2792 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2792 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2808 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2808 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2808 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2808 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2788 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2788 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2788 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2788 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 35 PID 2696 wrote to memory of 2716 2696 cmd.exe 42 PID 2696 wrote to memory of 2716 2696 cmd.exe 42 PID 2696 wrote to memory of 2716 2696 cmd.exe 42 PID 2696 wrote to memory of 2716 2696 cmd.exe 42 PID 2788 wrote to memory of 2900 2788 cmd.exe 43 PID 2788 wrote to memory of 2900 2788 cmd.exe 43 PID 2788 wrote to memory of 2900 2788 cmd.exe 43 PID 2788 wrote to memory of 2900 2788 cmd.exe 43 PID 2684 wrote to memory of 2576 2684 cmd.exe 45 PID 2684 wrote to memory of 2576 2684 cmd.exe 45 PID 2684 wrote to memory of 2576 2684 cmd.exe 45 PID 2684 wrote to memory of 2576 2684 cmd.exe 45 PID 2004 wrote to memory of 2580 2004 cmd.exe 44 PID 2004 wrote to memory of 2580 2004 cmd.exe 44 PID 2004 wrote to memory of 2580 2004 cmd.exe 44 PID 2004 wrote to memory of 2580 2004 cmd.exe 44 PID 2808 wrote to memory of 2752 2808 cmd.exe 46 PID 2808 wrote to memory of 2752 2808 cmd.exe 46 PID 2808 wrote to memory of 2752 2808 cmd.exe 46 PID 2808 wrote to memory of 2752 2808 cmd.exe 46 PID 2792 wrote to memory of 1684 2792 cmd.exe 47 PID 2792 wrote to memory of 1684 2792 cmd.exe 47 PID 2792 wrote to memory of 1684 2792 cmd.exe 47 PID 2792 wrote to memory of 1684 2792 cmd.exe 47 PID 2372 wrote to memory of 3036 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 49 PID 2372 wrote to memory of 3036 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 49 PID 2372 wrote to memory of 3036 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 49 PID 2372 wrote to memory of 3036 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 49 PID 2372 wrote to memory of 3036 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 49 PID 2372 wrote to memory of 3036 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 49 PID 2372 wrote to memory of 3036 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 49 PID 2372 wrote to memory of 1840 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 50 PID 2372 wrote to memory of 1840 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 50 PID 2372 wrote to memory of 1840 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 50 PID 2372 wrote to memory of 1840 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 50 PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2004 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2696 2372 a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1a8f1991d36f230365abc97550b746d_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows /e /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config ekrn start= disabled2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im ekrn.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im ekrn.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im egui.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im egui.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im ScanFrm.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im ScanFrm.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe func.dll, droqp2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all2⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5691180351c43cee13907dc0235e18b7a
SHA160a1dd127fc2f413b66ce6413563d2a4eaf94221
SHA256886581d8f51d4fbeed2eb42dfc5bd0a86101a3ff6c129adf96e02d466538d79f
SHA512cae749029d9fd88602d840b126a7c0095d5adfd6b1141f38f49106172e7c38eda4bff9f3640c396c8458a10323df69ce2ee675092691a5915bcfcbb819b6a87e