Overview
overview
7Static
static
7a1e18d573e...18.exe
windows7-x64
7a1e18d573e...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...oc.dll
windows7-x64
7$PLUGINSDI...oc.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SearchToolbar.dll
windows7-x64
3SearchToolbar.dll
windows10-2004-x64
3SearchTool...er.exe
windows7-x64
1SearchTool...er.exe
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...oc.dll
windows7-x64
7$PLUGINSDI...oc.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
100s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 08:41
Behavioral task
behavioral1
Sample
a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProc.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SearchToolbar.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
SearchToolbar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SearchToolbarUpdater.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
SearchToolbarUpdater.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/KillProc.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/KillProc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe
-
Size
280KB
-
MD5
a1e18d573e9d64f5928cc20aaf36aca5
-
SHA1
ac1e1c80a85d1c7a4148ac5a447af0f4d1078e98
-
SHA256
a39798386e56e5c80b7c878d250461550055708f2a75806660a361220fe58d20
-
SHA512
067644a3af2189bd1a224b5d68b8e45de67a01174d3ad1d26b28bba10e8b4be5ce5992cfa86ed6b576cc057691ba7dbad28e7f1bb5c18610fe341a9cf97a8043
-
SSDEEP
6144:Ee34Gww2wuKG8R9v3oxcCGy9jBeLJGy9jBk:DdukHAxcSxBevxBk
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000015fa5-8.dat acprotect -
Loads dropped DLL 3 IoCs
pid Process 964 a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe 964 a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe 964 a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0008000000015fa5-8.dat upx behavioral1/memory/964-10-0x00000000003E0000-0x00000000003F4000-memory.dmp upx behavioral1/memory/964-89-0x00000000003E0000-0x00000000003F4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 964 a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 964 a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1e18d573e9d64f5928cc20aaf36aca5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
682B
MD5222d836df0f1258f203d2b7cb6d66e3c
SHA1e72456614fe4cb79d69974b0c86844f74c62db1c
SHA256fbaa621e72b818f4bab433b948d26910e2b7cefe506e46dca821f20245a347c0
SHA512e66f13a966db497ec2752bdfdbca3f28cc9edbf1656a3025183130d6e799e17ed4515da616ef54536ddccf1efcc74e08ad13e85c26e37a786298ce9cc3f8bb00
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
24KB
MD5f2223ee8d3b5a26d9386dd90fd6326cd
SHA1edf24705bba2a459637722af3b7a8b7bac23d2ed
SHA256488aa34c7d2da0ab4a6b50463d5bb7fb402493602d3164bd1d56a2e93d97237e
SHA51259bdc5368c9dbcee3f7807a653618becac2c36ac4b4c5b3e8906f32e55ddb0620af30e1c771bd9e3145b7caf996c1cc439066e1ce17cbe6f3ed9248c2e6e4428
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f