Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe
-
Size
6.9MB
-
MD5
a8485e65dbcec636abd54112746c82a2
-
SHA1
1f2c655bc6ce5c59f3a573ef28ef5a519742fb27
-
SHA256
4316ccfc7d2509ffcb2ed35efcb054dbbcc5d31c3d0002b29ec385d12c78e8a6
-
SHA512
25d4337952206994cd6b805665a6311314d055fa48266991a8afc05ea5b36de327566990851e08d5355ec7fbfa775bd34f6a71fff34a7344d5e850093ebeeb74
-
SSDEEP
196608:V8hzWbjm+phyo0JXZ8XcL4j+1dBjqjrO1t23CogRC9flGV:Vpba+HyJqkoWEjrOzogaflm
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000234d8-15.dat acprotect behavioral2/files/0x00070000000234d9-16.dat acprotect behavioral2/files/0x00070000000234dc-21.dat acprotect behavioral2/files/0x00070000000234db-24.dat acprotect behavioral2/files/0x00070000000234da-22.dat acprotect behavioral2/files/0x00070000000234de-14.dat acprotect behavioral2/files/0x00070000000234dd-12.dat acprotect -
resource yara_rule behavioral2/files/0x00070000000234df-8.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1432 vmde.exe -
Loads dropped DLL 8 IoCs
pid Process 1432 vmde.exe 1432 vmde.exe 1432 vmde.exe 1432 vmde.exe 1432 vmde.exe 1432 vmde.exe 1432 vmde.exe 1432 vmde.exe -
resource yara_rule behavioral2/files/0x00070000000234d8-15.dat upx behavioral2/files/0x00070000000234d9-16.dat upx behavioral2/files/0x00070000000234dc-21.dat upx behavioral2/files/0x00070000000234db-24.dat upx behavioral2/files/0x00070000000234da-22.dat upx behavioral2/memory/1432-20-0x000000007C340000-0x000000007C3A0000-memory.dmp upx behavioral2/files/0x00070000000234de-14.dat upx behavioral2/files/0x00070000000234dd-12.dat upx behavioral2/memory/1432-28-0x0000000067000000-0x0000000067226000-memory.dmp upx behavioral2/memory/1432-29-0x0000000010000000-0x000000001050D000-memory.dmp upx behavioral2/memory/1432-30-0x0000000001080000-0x0000000001131000-memory.dmp upx behavioral2/memory/1432-31-0x0000000065000000-0x00000000657B3000-memory.dmp upx behavioral2/memory/1432-33-0x0000000064000000-0x00000000640DB000-memory.dmp upx behavioral2/memory/1432-32-0x000000007C3A0000-0x000000007C45A000-memory.dmp upx behavioral2/memory/1432-34-0x0000000067000000-0x0000000067226000-memory.dmp upx behavioral2/memory/1432-43-0x000000007C340000-0x000000007C3A0000-memory.dmp upx behavioral2/memory/1432-41-0x0000000065000000-0x00000000657B3000-memory.dmp upx behavioral2/memory/1432-87-0x0000000067000000-0x0000000067226000-memory.dmp upx behavioral2/memory/1432-95-0x0000000067000000-0x0000000067226000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmde.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 1432 3216 a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe 85 PID 3216 wrote to memory of 1432 3216 a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe 85 PID 3216 wrote to memory of 1432 3216 a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8485e65dbcec636abd54112746c82a2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\NSISSFX\VectorMagic\vmde.exevmde.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD50f10df8cc40af94df4c7d3886781fcfe
SHA18de6ea60e927800b8ef1cd87f38fca3729991ae8
SHA256f523ff1b10c2f838a16ef6e938b83ebfc3a0fdbf2a861b1d3a48e95a34db4ee4
SHA51266db96f7752e0c06ac51ad52b47a714126d21146621d646b6c3d15a2833b10ec1ebffc9096d6252db117166756113992f74fe1d5e26f257a67a98c044a98a70d
-
Filesize
213KB
MD5e1509181fa99abefb771109d82bd9a62
SHA12e3d9ec7eb032efeb2a3d44ce7f5655024698f80
SHA2561e7150d26f7a1ea432edcd5cd28e7eaefeedc51448fc0d2acbea1f40a07206d3
SHA512baaece000533726acadc569cbf1ee82278b429e8f435bcb9a444f245d029659309f2986da05ce80be1c6b967cc2f2d3058599089b453d12327aaa15297eb4d20
-
Filesize
1.1MB
MD58dc987990b1f48c6790ead6528996914
SHA1dfb85da28ea9d29cb7039c998c82efd19f137089
SHA2560ff67e9bd549f0cf4c0bf0299fc37694ef67c33c5cd32f37c1f0ae6b93466f89
SHA512155f69ab77614c5a4463641ef72d94c959a6598369c08cfaea151f0aaf3a4d51c2ceb0924c559780e4158c4883f6fda8dbfd30e6ecb97319d655c977b54738b3
-
Filesize
291KB
MD55f38087a4fb737444b16eef179bf1551
SHA10518f6196fdb8be025746ec342d0ba239a37aeee
SHA2562e5e3a3377cff2d740cff4d4cead3abff20381016f8f41a783e0f3c8d9d5ad10
SHA5125f8c4f97dbc053c23cdeebd7344a780df008fd32f1c3f2b7df605e6213e3f75e8a2ea82a230463f9392237ea672627d612638d6745ba545e863aa57c757ef032
-
Filesize
152KB
MD5ba5dde4ba6e5063708ff9a748ea0f134
SHA13d5d8e8fe1ec5257fd753b835cc623ec2fcf24c3
SHA256ced07ca0854b8235102098c37820af8b61ead44248097523bf4490b521b1ce0b
SHA512c1f54e64ca92c6d490c85f6ea1583fcbf876ff87609bd25313daa4fe474f60a29cf7b55ff6727276a5c41c6018f89dee2d80f238233c2b6ecf3f85d61bcee76a
-
Filesize
717KB
MD50f5ab45c176691d232007c469b5c8793
SHA1529e80ff917b1911af47d470a0062a8866778e99
SHA2562de1e3685c117fc5c5352d79bd41b7ef431d78a4be5547f18fd3f17b372c3a41
SHA5129108490b5f7881c5d66adb1281b62a56045e6d1d2ab4280046bf8e3f47b14f479838042a96da3300013521fce1166930919a5301921c3f1318def97c31a3fd21
-
Filesize
2.7MB
MD5b8214751b658c83cd70deb08870edc1e
SHA1d18b424abcf22c7baa727c42264f47a47b4e1d39
SHA256410105d8b87a0a0541d6a12a150e2b30b7122457e05bfc4410e25d7870811d84
SHA512e205de4d77f63d09fa55f02593ed045fa9be5bec03eb23b0866c5e532c36171f04cce12dccb7d00d5d095e016257a743ce364a54b5c48a868be4702810285681
-
Filesize
2.5MB
MD536bf89a20893d955413199842bba9a11
SHA1cefe4ca8e011d135da8a13f6d9c9057a400d7c4a
SHA2566f1ae21dd65e1e6d19f5dcf9a1e25bc0fcc24d5d3dfa2705b3c8ec1bb943333b
SHA512c7902b2af47a082766496a9af6b931f9089792a55fbe81b454b9c5309e72f162845801b5fa673126d4d9323500c46530c490131d56dae04fd1c8a48e0be020a1