Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
a2e967bb7b16a6a7f0e74ec9033682cc
-
SHA1
4b59a0eb2004905c8c14506bbca1bf34b2e4dcd9
-
SHA256
dabbaed6ef1a2e69fde3fca24e85a909b3ae5aaf52a039f7167918ff2711bcd3
-
SHA512
f50f5498fa2a397bc8936299946a9455fbb2433dd77dc52aa6bdaa20c1f5cc5b4c681642b984284310cd360e551b3c61ae547fbc38fed44dd97c48c0860f0fd9
-
SSDEEP
24576:C/ukNqOaIM0D3Q1gqUbHU8qX0H6mjrlsVTHi9gnn0Oe2QbYOJcQyLeSXCeSLZ5b9:CiO3LQXUovX0H6mjrlCHyTNOO3ieSXop
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 580 defender.exe -
Loads dropped DLL 2 IoCs
pid Process 1652 a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe 1652 a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/580-21-0x0000000000400000-0x0000000000F22000-memory.dmp upx behavioral1/memory/580-23-0x0000000000400000-0x0000000000F22000-memory.dmp upx behavioral1/memory/580-22-0x0000000000400000-0x0000000001BF2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: defender.exe File opened (read-only) \??\S: defender.exe File opened (read-only) \??\I: defender.exe File opened (read-only) \??\M: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\Z: defender.exe File opened (read-only) \??\J: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\Y: defender.exe File opened (read-only) \??\G: defender.exe File opened (read-only) \??\H: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\O: defender.exe File opened (read-only) \??\V: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\E: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 580 defender.exe 580 defender.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 580 defender.exe 580 defender.exe 580 defender.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 580 defender.exe 580 defender.exe 580 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 580 1652 a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe 30 PID 1652 wrote to memory of 580 1652 a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe 30 PID 1652 wrote to memory of 580 1652 a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe 30 PID 1652 wrote to memory of 580 1652 a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2e967bb7b16a6a7f0e74ec9033682cc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\defender.exe"C:\Users\Admin\AppData\Roaming\defender.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5dd18bce36b184e2901a8ad94e48c30f8
SHA14a4ab8d0a064fbb8a85798c9f3cca2db8779d9bf
SHA2568f3f9db39259dd1da7cc464765fe901516a5180d646c426e2f3867971a75faf2
SHA512423079c29547796b4c03810b6a6f78af8886fdb94450c480b501d34085192dfc1b73e0ac17b2c7b4f09c280b44a38a6783530dfdc0e6cde0b71e23571f4fe17e