Overview
overview
7Static
static
3a202f186f5...18.exe
windows7-x64
7a202f186f5...18.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISList.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISList.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
General
-
Target
a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe
-
Size
121KB
-
MD5
a202f186f53fd1968bae80ebd5042c65
-
SHA1
5ae007bf528f99111a27e708b4213047e9c656c8
-
SHA256
7d61f084f43e4f3219c6d43910b998693703c16bee64d6553b07c7d894c616e7
-
SHA512
1de52fde7c3ffc950079a3b4998584b3dbe7ea12b103374f89feee3297bf6bbdd0a6b2bdc5e7eca49b67d273d52c423559df84da035afac88bbdef594dbbc38b
-
SSDEEP
3072:ZLk395hYXJnceADRRD2xMKdWanB5u9+nleepEcB94p:ZQq1mDRZRwB1eepEcBw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1580 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe 1580 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0008000000015d7b-2.dat nsis_installer_1 behavioral1/files/0x0008000000015d7b-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1580 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1580 2388 a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe 30 PID 2388 wrote to memory of 1580 2388 a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe 30 PID 2388 wrote to memory of 1580 2388 a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe 30 PID 2388 wrote to memory of 1580 2388 a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a202f186f53fd1968bae80ebd5042c65_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD52e0785f18f8714393bc4bc1fe170eadf
SHA11efba431c0fac46c6cb6f60dc08f65a0e23ccf3d
SHA256e68d65626b24e7c1f6fbe1001f43174d0243095181025736f37ad704662f4351
SHA5128a272bb264fa066960a4f34411a81652839eccdbc6fa25be20c0b94d7d10b16cb568338abb5d1a96c155cbc4bc7923d0387fa36bed69c1021296cc6cc5fbb45e
-
Filesize
121KB
MD5a202f186f53fd1968bae80ebd5042c65
SHA15ae007bf528f99111a27e708b4213047e9c656c8
SHA2567d61f084f43e4f3219c6d43910b998693703c16bee64d6553b07c7d894c616e7
SHA5121de52fde7c3ffc950079a3b4998584b3dbe7ea12b103374f89feee3297bf6bbdd0a6b2bdc5e7eca49b67d273d52c423559df84da035afac88bbdef594dbbc38b