Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe
-
Size
15KB
-
MD5
acffd07188e867b5d7f00eefe8b5f3d3
-
SHA1
c7a8189f56472374e385fd18ec81539e9277af74
-
SHA256
e1ae5a2aa034dd39148aa907cb79e7e7b764c3f8663e8e6f7f63360353e8c726
-
SHA512
f899df30024c95ca3d3dd2ed4cd18c5e2677a4e7aa3ef927d49e79c420fa044e4da82a16a0f7acf8e12d8f1fc2e188abb5e2a8c5941494dc8c85ae710a652004
-
SSDEEP
384:niJFuNlNNJr6Vxovczv3da23FYLtFSz7viPCHRHrC5:iJFadUxov8v3E23yWHvialm5
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\xolehlpjh.dll = "{F0930A2F-D971-4828-8209-B7DFD266ED44}" acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2536 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xolehlpjh.tmp acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xolehlpjh.nls acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe File created C:\Windows\SysWOW64\xolehlpjh.tmp acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44} acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44}\InProcServer32 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44}\InProcServer32\ = "C:\\Windows\\SysWow64\\xolehlpjh.dll" acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F0930A2F-D971-4828-8209-B7DFD266ED44}\InProcServer32\ThreadingModel = "Apartment" acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2536 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2536 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2536 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2536 2852 acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\acffd07188e867b5d7f00eefe8b5f3d3_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\A229.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD546ba1f0f9f15ae7b900b2a13256afbde
SHA1c70b2bab26d1fa93c2de9f68d0eaedad2bb9aab3
SHA256eaf45f311b023211a565909771e7b8dd3988315a36f3982b55cf01e64efa35a2
SHA51296ec0e80800f5668934fc29e86143478bb3d6c65a1a38c139b7f40c8f79bcf2370bcd507a06d86d8302284d5de3b5b00e5bb9c17f5c26f0ce782ce1d103fdcb8
-
Filesize
2.1MB
MD5cb72f0908d289ce9d21f2d33b573ba95
SHA190f693bd0a8f884f4681e8fb80159e51b51fb68f
SHA2567e1fbdb30895126ed8147c769c9810588a1b720f4d162d32e3f7dd4087a2f1ae
SHA512118179ce0b01914b097c5fd36b49e79c65da22b4d0f2521623ff42a483e5194d948b1c25a0f9719ff3d485594b17913065fa29823a0523cbecbed0ed1257a08d