Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe
-
Size
151KB
-
MD5
a76cc16909af08295b54cbb2d7c85ce3
-
SHA1
88e05e4cb13a7fb5d958be6169e4a71ef1319c2e
-
SHA256
906da4f9c9c364515611b5bed1b9483076aa51089b1f240b7fca7eafc8d51573
-
SHA512
2402a046edcb29476f96cad38cf675c4ba3d97649c2d41729d4e45205d36f7b853c711b7be4911a4ac44a26713759c723e8167aa0695070bf1155546265d54b8
-
SSDEEP
3072:XiHOgk1pHpPZkUjWVzplLS7DI3q7SuVq1AX+DQX2BC1DtPbUgVWzK7oknwo+B:uOgIPZk1VzplLvU6AX+DQX2B8hb2zfks
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\O: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\K: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\J: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\Z: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\U: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\I: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\H: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\G: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\T: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\S: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\R: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\Q: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\P: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\M: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\E: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\X: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\W: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\V: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\N: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened (read-only) \??\L: a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened for modification F:\autorun.inf a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened for modification C:\autorun.inf a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\GROOVE.EXE a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log winword.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winword.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1820 winword.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2152 a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1820 winword.exe 1820 winword.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1820 2152 a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe 30 PID 2152 wrote to memory of 1820 2152 a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe 30 PID 2152 wrote to memory of 1820 2152 a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe 30 PID 2152 wrote to memory of 1820 2152 a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2636 1820 winword.exe 33 PID 1820 wrote to memory of 2636 1820 winword.exe 33 PID 1820 wrote to memory of 2636 1820 winword.exe 33 PID 1820 wrote to memory of 2636 1820 winword.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a76cc16909af08295b54cbb2d7c85ce3_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD552227803f26b1d23c02335f7e83c1fa9
SHA1bd888780c3e7feb63ce54b56d23c4661a98489e8
SHA256dbf76edd021aea3c29860d501778cb4354718e42b4461b3a5cf91569157094fa
SHA512db097fee92c561110bcd4fa5d305bd3b08e98b9eea0b87c87b3977880a61264de9fb9cbb53d7e2fb5af2ff10539e77ed6f24f946abc2e88dd58afe3694198d46
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
151KB
MD5a1be19b7ca931be040f06a54779d1684
SHA186fe1776ff05540ca289dceb3830ea36dec3bd0c
SHA2568907e55c940094b0d0c9c90ab8c0450a4fc3dbeb1db380d7844627b68044fa0c
SHA512881edba87d6f6a7824a5e667bba6a3671978797c605a3dd2ac601c26295358d879fd701cbca78440280611811a4455c169d505c25cc5622ccc361170e5197741
-
Filesize
152KB
MD57f564c9a1aef03437fc6770e8c00d852
SHA1c9e6db8f1c3f8c5c4ecd738f05a21a4c85c33f53
SHA25612b93f5897857628e55d1588f3e450a032624c409f19cf1fc00ba5076ff09e15
SHA512a6399f68d7fd847bf2825ac6f07903814e3e6771c88514209990ab3bf9fc53fc05d39fac6a877bfb8a0e6cfe25211e9774b01d3eb9a46e206c3871f14022c7b5