Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe
-
Size
679KB
-
MD5
ad1cfb3859ce1c0e1355b0b77a84ed9f
-
SHA1
c1780001081a0f12e9579d288a9ce2d1ecbec6da
-
SHA256
efac694b4060efc93f322ea93b5c2734d383a3babd28421f979d2e7b4138ef6f
-
SHA512
fae476ef039520437f0c4f394f92c97c5a9d2a8a1bd2ecb5c2935c820e657e3e8b94edeb883e74c3a06c7e1ce3ea5e18a29ec83770fe3986b0c0c982ef532af6
-
SSDEEP
12288:GdMDRgsQVa+YDgfO7Onvt1c/ZMSYOZOLyHWmHGjYV5xIJMxfhs43H61pl7U6:uMDRgP/OmOUF6nYXUBGUVXB9hhH6rJl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 svchost.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systemcleaner.lnk ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 systemcleaner.exe -
Loads dropped DLL 6 IoCs
pid Process 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\GalileoCleaner\systemcleaner.exe ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\GalileoCleaner\systemcleaner.exe ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\Uninstall.lnk ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemcleaner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 systemcleaner.exe 2740 systemcleaner.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2860 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2860 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2860 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2860 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2740 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2740 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2740 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2740 2120 ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad1cfb3859ce1c0e1355b0b77a84ed9f_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Deletes itself
PID:2860
-
-
C:\Program Files (x86)\GalileoCleaner\systemcleaner.exeC:\Program Files (x86)\GalileoCleaner\systemcleaner.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
977B
MD5a317c8ca449656a0f0a02a46cf20d57c
SHA181675dcd3ecf3d100b13a17ac175efb094f274d5
SHA256cd9e5950a4406d00ed9891e16c7e09528fb075229fbcd8ce65ac8f939952ee81
SHA512fc28ac0108274d414e454cfb1a96bc228dddce9f4efb88e6011498944e971a0a1273851d22d73ad08b0cdc8dd6c65426619d18340e5312c4399230e2eb540e21
-
Filesize
274KB
MD5705fee2a711cc35d38adffa1f836cfc8
SHA19e00aa9a6f3a7fef23f57764bbad3a50b1329837
SHA25644fac03c31d677b4f0878caa9587308c40b8eb85f74bd4c1879fb4565512ee27
SHA512e8dc4a53298e5dff457a93cea81b9aeeada710de06b6d618741a3c852e874661803065290489454ba8d5bfc4597adc3ca573eeb0da0e82643a60ab365ef1a31c
-
Filesize
1KB
MD541c51b47bbfd4780f1426bef76488d3c
SHA17dfc006b982fdba3611c2bd347e2af0087c0f1a5
SHA256287bf07dece78f7df5ea05b34f534139f3e9ad09f7e60eb43e2554044b14dcb7
SHA512fbe114ed758a6370695b70da2e2dc307de1dd364528c4ce3ce91217a83447fd0dde9ee77fd606492efcb6a2185741a320c9aefbd16c89b0f98d075360950db48
-
Filesize
1009B
MD5a4e3bdae6e95e39f1d45485fe2925137
SHA16952ff01fdfe486d0b1769d9e9157e8616ea39c2
SHA2568e1f399ab9a8cbba6870d5f4403c3d36efb42e2430bd3cced5f0f793b4609713
SHA5121cc9eeac45e4649cae64461f12a5dd85e5c70232a4f636fc3b616ac856b1973e5c6b0c7b405d5761106d015904d44d891e5ce94783a0360296b617bfe082303f
-
Filesize
679KB
MD5ad1cfb3859ce1c0e1355b0b77a84ed9f
SHA1c1780001081a0f12e9579d288a9ce2d1ecbec6da
SHA256efac694b4060efc93f322ea93b5c2734d383a3babd28421f979d2e7b4138ef6f
SHA512fae476ef039520437f0c4f394f92c97c5a9d2a8a1bd2ecb5c2935c820e657e3e8b94edeb883e74c3a06c7e1ce3ea5e18a29ec83770fe3986b0c0c982ef532af6