Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe
-
Size
670KB
-
MD5
a8240a2ab1b68fea07313677f4ba5709
-
SHA1
03721757a34ff8d38f38379f39f704f53503b2e3
-
SHA256
d8a22780f7d5d9422e33e74d2921c7dc515c238552f1a55373bd3ab35312981f
-
SHA512
80d576979a82c1b1b63b6b6a3bbc54bcc00fd1626da6f8871729d11c4a661f0139a6301eb7a29f17bf68759a37993570129acdd0815c2105954c68cce7984f24
-
SSDEEP
12288:J4fhVHl3blTMbcoS8WQD7tRbFsKptSlwLk5k2OAtYW2LTL:J+ZbMBTWQD7tRCi6wLB2OAtaLT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 autoload.exe -
Loads dropped DLL 3 IoCs
pid Process 2680 a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe 2680 a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe 2820 autoload.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AutolandAutoload = "C:\\Users\\Admin\\AppData\\Local\\Temp\\autoload.exe" autoload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoload.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main autoload.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2820 autoload.exe 2820 autoload.exe 2820 autoload.exe 2820 autoload.exe 2820 autoload.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2820 autoload.exe 2820 autoload.exe 2820 autoload.exe 2820 autoload.exe 2820 autoload.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 autoload.exe 2820 autoload.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2820 2680 a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2820 2680 a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2820 2680 a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe 30 PID 2680 wrote to memory of 2820 2680 a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8240a2ab1b68fea07313677f4ba5709_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\autoload.exe"C:\Users\Admin\AppData\Local\Temp\autoload.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199B
MD50c9dabc54b2a182b67315ab5a8261d5d
SHA1e348a6fe9b2d2096e451db18997b3a768342397d
SHA25691d4e7eeb37b7ca178d061a5a26196bcfafeb4460c1718454aa6996eef552bdf
SHA512837bf63d4baae9244198d0da2167cb77c52c0d9b6296bf3c8ff4f94fe7fe7ebccc461258c4a744a3325a6eb9017d9de78300d226e443987b559c161e6522dbf7
-
Filesize
1.0MB
MD573425df9a203c71d0c490645b79fd5bb
SHA1d396e508a1b303194b69fcde01c9aea911d5c679
SHA2567a2f6ab34e1aaf6f8758f5fc6414d4402435739e25c1af1d4c47bcb5753eefe7
SHA5126e8533126a598cc5ad93ff2194aaece7515b132d063a0b41d4659fcf0f02235adeccb4d8a642ccb8c80dbd5c29c4ed3953090d1e4b604181774d92e1fc080a7c