Analysis
-
max time kernel
142s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 17:39
Behavioral task
behavioral1
Sample
a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe
-
Size
960KB
-
MD5
a37e2dafe191e2b5032816242f442fee
-
SHA1
d71d8488eaf31ab93eefd44833f93a32c063f479
-
SHA256
a828fe824249c9965db6d964a6fbb701f148aada1b56d9a39b58129beb537371
-
SHA512
de25c76803ebd5296ed06fde3c648168da225150d5bf09766747beee0351b34ffb4e8832f333b46cda0b1ae426175565674e78d6838a6d874eaa748465cec094
-
SSDEEP
24576:HwU/UwhWvS3u9OvUisQM6GcC1pfnnnDolPNl3HpM5b:HZU8W81vdMcUfnnDIZpMB
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000015d81-140.dat acprotect -
Executes dropped EXE 4 IoCs
pid Process 3024 shdocvw.exe 1048 svchost.exe 2924 updater.exe 1816 svchost.exe -
Loads dropped DLL 10 IoCs
pid Process 2392 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe 2392 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe 3024 shdocvw.exe 3024 shdocvw.exe 3024 shdocvw.exe 2924 updater.exe 2924 updater.exe 2924 updater.exe 1048 svchost.exe 1816 svchost.exe -
resource yara_rule behavioral1/memory/2392-0-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/files/0x0008000000015d39-11.dat upx behavioral1/memory/2392-10-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/3024-12-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/3024-112-0x0000000005FA0000-0x0000000006014000-memory.dmp upx behavioral1/files/0x0007000000015d71-106.dat upx behavioral1/files/0x0009000000015eb1-116.dat upx behavioral1/memory/1048-115-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/3024-108-0x0000000005FA0000-0x000000000611F000-memory.dmp upx behavioral1/memory/3024-119-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1816-143-0x0000000000710000-0x000000000072D000-memory.dmp upx behavioral1/files/0x0007000000015d81-140.dat upx behavioral1/memory/1816-133-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/1048-131-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/2924-126-0x0000000000380000-0x00000000003F4000-memory.dmp upx behavioral1/memory/2924-149-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/1816-150-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/1816-153-0x0000000000710000-0x000000000072D000-memory.dmp upx behavioral1/memory/1816-151-0x0000000000400000-0x000000000057F000-memory.dmp upx behavioral1/memory/1816-157-0x0000000000710000-0x000000000072D000-memory.dmp upx behavioral1/memory/1816-164-0x0000000000400000-0x000000000057F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\shdocvw = " C:\\Program Files (x86)\\F32411\\shdocvw.exe " reg.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\F32411\shdocvw.exe a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe File created C:\Program Files (x86)\F32411\lst.txt shdocvw.exe File created C:\Program Files (x86)\F32411\svchost.exe.manifest svchost.exe File created C:\Program Files (x86)\F32411\shdocvw.exe a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\F32411\Svchost.ini shdocvw.exe File opened for modification C:\Program Files (x86)\F32411 shdocvw.exe File opened for modification C:\Program Files (x86)\F32411\svchost.ini shdocvw.exe File opened for modification C:\Program Files (x86)\F32411\svchost.exe.manifest svchost.exe File opened for modification C:\Program Files (x86)\F32411\shdocvw.exe updater.exe File created C:\Program Files (x86)\F32411\updater.exe shdocvw.exe File created C:\Program Files (x86)\F32411\runer.bat shdocvw.exe File opened for modification C:\Program Files (x86)\F32411 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\F32411\Svchost.lst shdocvw.exe File created C:\Program Files (x86)\F32411\svchost.log svchost.exe File opened for modification C:\Program Files (x86)\F32411\svchost.log svchost.exe File opened for modification C:\Program Files (x86)\F32411\updater.exe shdocvw.exe File opened for modification C:\Program Files (x86)\F32411\runer.bat shdocvw.exe File opened for modification C:\Program Files (x86)\F32411\svchost.ini svchost.exe File opened for modification C:\Program Files (x86)\F32411\svchost.lst svchost.exe File created C:\Program Files (x86)\F32411\Plugins\Uploading.plg shdocvw.exe File created C:\Program Files (x86)\F32411\version.txt shdocvw.exe File created C:\Program Files (x86)\F32411\svchost.exe shdocvw.exe File opened for modification C:\Program Files (x86)\F32411\svchost.exe shdocvw.exe File created C:\Program Files (x86)\F32411\svchost.ini shdocvw.exe File opened for modification C:\Program Files (x86)\F32411\Plugins\Uploading.plg shdocvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shdocvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2392 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe 2924 updater.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe 1816 svchost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3024 2392 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe 30 PID 2392 wrote to memory of 3024 2392 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe 30 PID 2392 wrote to memory of 3024 2392 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe 30 PID 2392 wrote to memory of 3024 2392 a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2760 3024 shdocvw.exe 31 PID 3024 wrote to memory of 2760 3024 shdocvw.exe 31 PID 3024 wrote to memory of 2760 3024 shdocvw.exe 31 PID 3024 wrote to memory of 2760 3024 shdocvw.exe 31 PID 2760 wrote to memory of 2744 2760 cmd.exe 33 PID 2760 wrote to memory of 2744 2760 cmd.exe 33 PID 2760 wrote to memory of 2744 2760 cmd.exe 33 PID 2760 wrote to memory of 2744 2760 cmd.exe 33 PID 3024 wrote to memory of 1048 3024 shdocvw.exe 34 PID 3024 wrote to memory of 1048 3024 shdocvw.exe 34 PID 3024 wrote to memory of 1048 3024 shdocvw.exe 34 PID 3024 wrote to memory of 1048 3024 shdocvw.exe 34 PID 3024 wrote to memory of 2924 3024 shdocvw.exe 35 PID 3024 wrote to memory of 2924 3024 shdocvw.exe 35 PID 3024 wrote to memory of 2924 3024 shdocvw.exe 35 PID 3024 wrote to memory of 2924 3024 shdocvw.exe 35 PID 3024 wrote to memory of 2924 3024 shdocvw.exe 35 PID 3024 wrote to memory of 2924 3024 shdocvw.exe 35 PID 3024 wrote to memory of 2924 3024 shdocvw.exe 35 PID 1048 wrote to memory of 1816 1048 svchost.exe 36 PID 1048 wrote to memory of 1816 1048 svchost.exe 36 PID 1048 wrote to memory of 1816 1048 svchost.exe 36 PID 1048 wrote to memory of 1816 1048 svchost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a37e2dafe191e2b5032816242f442fee_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\F32411\shdocvw.exe"C:\Program Files (x86)\F32411\shdocvw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\F32411\runer.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v shdocvw /t REG_SZ /d " C:\Program Files (x86)\F32411\shdocvw.exe " /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Program Files (x86)\F32411\svchost.exe"C:\Program Files (x86)\F32411\svchost.exe" /stealth3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\F32411\svchost.exe"C:\Program Files (x86)\F32411\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1816
-
-
-
C:\Program Files (x86)\F32411\updater.exe"C:\Program Files (x86)\F32411\updater.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55c75256ff15177fadac5c895c962b733
SHA1e90e0c7a8be93e60dc3410157c38d7d3f732b88f
SHA25662f1c6afca91811f41c42ddb85464a4ddf0787793a079a68587c1a0f0b53c5d3
SHA512f2c18915b819fe7d8362a1875a360e36402245eff7e3980f628b0c0a07194378a0c7096e14ffe111bbfe56b46f8cae9c2a1b7993eda08e997da308cd313bf9cb
-
Filesize
156B
MD5f3e9a25858e6789aab82f2505bdcdce9
SHA1f468def17a25dd1eb7a607cfbfcc722a67614211
SHA256bb83f3eeb4e33ed9200a691c9eec50788ae778cf983b7c92a1393f9dcfe1c49b
SHA51287dd5519576a7a339b1626e6f1c3a669f5ae30582db4cd365e0ff1fc9d40343eab03239bac14a2f04bebb214087c0f946946a70c91e16af45d2437e0c88c724f
-
Filesize
960KB
MD5a37e2dafe191e2b5032816242f442fee
SHA1d71d8488eaf31ab93eefd44833f93a32c063f479
SHA256a828fe824249c9965db6d964a6fbb701f148aada1b56d9a39b58129beb537371
SHA512de25c76803ebd5296ed06fde3c648168da225150d5bf09766747beee0351b34ffb4e8832f333b46cda0b1ae426175565674e78d6838a6d874eaa748465cec094
-
Filesize
535KB
MD557c3d3cd8d2c2863ce09cd1f41836718
SHA14ad095d123bc76f1082bbc66d20bb8836df712cd
SHA2563932741f0829f9756acd0ef8c549b6b0676f0f61293ea3ce91440370ca8f8dd4
SHA512380788dccd69b8261a47bfe0dc7498ab72e32ba614f534e50de64366c3a7627fcd04f49df590196ad19bb8e1b0d3bb5f1749f3da4029690e2363f1661ebd8f42
-
Filesize
2KB
MD5105e7661bdd36e28fc3c27c4341102b2
SHA103a755308fbf950ddc1d0688cc23459a21c5b68c
SHA256fb4aefac91000329578fd8d0c10ec6447089f6f6e188ef179fa1eb46cf2ce725
SHA51271f8317580e8def23bd46bfd56d4866afb79e5cd8047f495b7e67a03f36e36b279c07fdabd35c075b67adfb2ca17c569337379bdc5d8a205a5baa84aae2345fc
-
Filesize
3KB
MD56633c83586f4a151e96f5f16a6ed5f2d
SHA167b3a005850bd38d5307e33265cf01996a9c0bc3
SHA2568487b174b6af820bc7ace695729df7e2ee56f9f012b9ac6667fa58b0d75c8444
SHA5124e9fc8d78e979d6f4cf5eeef656f4d07105f619912fa3dcc53e86952606ca3ebda3bb0eebec849fbbe295a612ce49e8590ad8c48424facefbc1e059468895f37
-
Filesize
202KB
MD5fc438aff60f8040bfee7713a4ea2fc5d
SHA102104d5d1c56897fe1de0f63db35aa9094af533d
SHA256697bd104278f0bc1ae965a3fe415db2d19729ac15bc7f68e826401067537894c
SHA512d2e55a0006e1f35e44124a6911c394849c59c6d4dd6e1dfaa3c9298589186465b88b394c406ab4150ae86d8a61f61329d4bf3879cc81323c19e152e9babe4f17
-
Filesize
35KB
MD5b53aa2d38566d4e21c3c914c2aa650f6
SHA12d1e2add2c7b0dcc5cb1cc124a4bece34854d11d
SHA256925deb907ac4b6988c3da7acd5a12456bd544d40327ba26d1841ce0d9d4ed1c4
SHA51235d3899d58c4cb8d66566903091a587a32c572bd86da48642b3405218624a2384d3360fc528aeb43f3b77ec1170b16c116be2bf49fe79a7608c59caf81f8c95a