Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
ac95186825b222457c085d32ca4cb4a0
-
SHA1
9f2ea2094d5c42102db88e78ec7a6521684e99ff
-
SHA256
56302b13ba25b27b2cc4e7f51ee00db478f814898a19355e1b79976e1387f322
-
SHA512
2e6852d766f3ca0541d79f237a6846ebdaa1b6d04674031dadc76746ddc66bd57e378faf047bbb95644e05f4b53512d85f89661181b72e8fb4fbbcf651545095
-
SSDEEP
49152:PaWDnkvA3cNuZtt1p7oeYlrEKgI8OkU/WXnyhJ1KXZ3pN+xM9FjDn4y+Cyz0:bXIujZLYOKw/3aJEpZ8xAZcCyz0
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\ElbyCDIO.sys sys.exe File opened for modification C:\Windows\SysWOW64\drivers\ElbyCDIO.sys sys.exe File created C:\Windows\SysWOW64\drivers\ElbyDelay.sys sys.exe File opened for modification C:\Windows\SysWOW64\drivers\ElbyDelay.sys sys.exe -
Executes dropped EXE 4 IoCs
pid Process 1100 sclone.exe 1272 sys.exe 2424 CloneDVD2.exe 304 RgDrvls.exe -
Loads dropped DLL 18 IoCs
pid Process 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 1100 sclone.exe 1100 sclone.exe 1100 sclone.exe 2888 cmd.exe 1272 sys.exe 1272 sys.exe 2888 cmd.exe 2888 cmd.exe 2424 CloneDVD2.exe 2424 CloneDVD2.exe 2424 CloneDVD2.exe 2424 CloneDVD2.exe 2424 CloneDVD2.exe 2424 CloneDVD2.exe 304 RgDrvls.exe 304 RgDrvls.exe -
resource yara_rule behavioral1/files/0x000500000001923b-131.dat upx behavioral1/memory/2888-140-0x00000000029C0000-0x000000000304E000-memory.dmp upx behavioral1/memory/2424-146-0x0000000000400000-0x0000000000A8E000-memory.dmp upx behavioral1/memory/2424-165-0x0000000000400000-0x0000000000A8E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 RgDrvls.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ElbyCDIO.dll sys.exe File opened for modification C:\Windows\SysWOW64\ElbyCDIO.dll sys.exe File opened for modification C:\Windows\SysWOW64\drivers sys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CloneDVD2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RgDrvls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sclone.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1100 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 31 PID 2176 wrote to memory of 1100 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 31 PID 2176 wrote to memory of 1100 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 31 PID 2176 wrote to memory of 1100 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 31 PID 2176 wrote to memory of 1100 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 31 PID 2176 wrote to memory of 1100 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 31 PID 2176 wrote to memory of 1100 2176 ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe 31 PID 1100 wrote to memory of 2888 1100 sclone.exe 32 PID 1100 wrote to memory of 2888 1100 sclone.exe 32 PID 1100 wrote to memory of 2888 1100 sclone.exe 32 PID 1100 wrote to memory of 2888 1100 sclone.exe 32 PID 1100 wrote to memory of 2888 1100 sclone.exe 32 PID 1100 wrote to memory of 2888 1100 sclone.exe 32 PID 1100 wrote to memory of 2888 1100 sclone.exe 32 PID 2888 wrote to memory of 292 2888 cmd.exe 34 PID 2888 wrote to memory of 292 2888 cmd.exe 34 PID 2888 wrote to memory of 292 2888 cmd.exe 34 PID 2888 wrote to memory of 292 2888 cmd.exe 34 PID 2888 wrote to memory of 292 2888 cmd.exe 34 PID 2888 wrote to memory of 292 2888 cmd.exe 34 PID 2888 wrote to memory of 292 2888 cmd.exe 34 PID 2888 wrote to memory of 1272 2888 cmd.exe 35 PID 2888 wrote to memory of 1272 2888 cmd.exe 35 PID 2888 wrote to memory of 1272 2888 cmd.exe 35 PID 2888 wrote to memory of 1272 2888 cmd.exe 35 PID 2888 wrote to memory of 1272 2888 cmd.exe 35 PID 2888 wrote to memory of 1272 2888 cmd.exe 35 PID 2888 wrote to memory of 1272 2888 cmd.exe 35 PID 2888 wrote to memory of 2424 2888 cmd.exe 36 PID 2888 wrote to memory of 2424 2888 cmd.exe 36 PID 2888 wrote to memory of 2424 2888 cmd.exe 36 PID 2888 wrote to memory of 2424 2888 cmd.exe 36 PID 2888 wrote to memory of 2424 2888 cmd.exe 36 PID 2888 wrote to memory of 2424 2888 cmd.exe 36 PID 2888 wrote to memory of 2424 2888 cmd.exe 36 PID 2424 wrote to memory of 304 2424 CloneDVD2.exe 37 PID 2424 wrote to memory of 304 2424 CloneDVD2.exe 37 PID 2424 wrote to memory of 304 2424 CloneDVD2.exe 37 PID 2424 wrote to memory of 304 2424 CloneDVD2.exe 37 PID 2424 wrote to memory of 304 2424 CloneDVD2.exe 37 PID 2424 wrote to memory of 304 2424 CloneDVD2.exe 37 PID 2424 wrote to memory of 304 2424 CloneDVD2.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac95186825b222457c085d32ca4cb4a0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\sclone.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\sclone.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt4586.bat3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\reg.exereg import 1.reg4⤵
- System Location Discovery: System Language Discovery
PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\sys.exesys.exe4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\CloneDVD2.execlonedvd2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\RgDrvls.exeC:\Users\Admin\AppData\Local\Temp\RarSFX0\RgDrvls.exe "C:\Users\Admin\AppData\Local\Temp\CDVEC14.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115B
MD574f39b08a556b00acdcc1a484f8982f5
SHA1b84a5e2735d2be7f19f28e7fd520a8cba617493b
SHA25605c935b42ec10fa2a23a93261c42807c37ef97940e18f544f5180d6084932331
SHA512668605dfbe0ddef1890d528eb962d04cc3ae49173797f6b18f4fb8e5ca85e0a1ecab621518292a047ed6d9c9dba382473c66c3b661625150d991456733be8e7a
-
Filesize
1KB
MD534c15aebb6e18befdd8f39ecb4a397b6
SHA1a98ae41614911d1e8a27722679671a4976a087b4
SHA2561b23e2aaccadb12bffbc804cc79e50f126684fbd0bc1cbc2ec0b2ebc34d0023a
SHA512ff3fbff0e17fa7537e75e780cd4b152282fd0bd852f17d3334434cd07e0c1eb8100ab5e005b4de2cb109a74dc25b0397707de56904bb48f831bcdc434b59878b
-
Filesize
1.8MB
MD59943039167e5d0dea6974ba3c2a68957
SHA1ded956a02289c5128b5334e6894ea4caaf746c52
SHA25609668d06420b60e6494682eafa3281f9e99dd95ffff39570539177fd488a61b8
SHA5123569e8dfe8a2539a024f1de7a9b131bcb2a887ab309bbc54f6045e5715edafbf3304261a317ffc1b73d78ab2e9eb21ef6d1651a70ec895142d950bad94e3d4f0
-
Filesize
331B
MD57dbe5b386b7e913052a66f040d4fd7d6
SHA1b3084b34c8ba29bac63c26457bf398b70a0d0c93
SHA256cac4e72f2de7ecf6d3c4e679009293e7c79391bceaedca522f5b76aa32f492b2
SHA512addc893bb9b64df64514c3d945618e2bcf9e46b8b212b0bb2c6b694b984561bb29090a4cf9da3713b4edc93870aa12c65f95b47b1fbffe46995a6eaf962eebc3
-
Filesize
357KB
MD5338597a988b998216eb8f5f873614847
SHA102e015dd56055740a4f0e2d450900893e97b9344
SHA25607616065988ad9cf6a77aaa5caf9ff7072aeaf5daabb835b28199520e1c74f90
SHA5124a491b456ebaa57bf91311985032b4f5425addd9f0da15cff1abff4bb5b49e34c6eec90782f15c568893923296738bf6e42121252970759f66d77ba69759ecce
-
Filesize
80KB
MD56b760f1008de937e0c99167149335184
SHA128c4240d3725512420e739f7c2b416cec93f1951
SHA256f8d9759d6f633ef16ca96fc480b5080fc1f8be5203003a87c816725dc159a4d8
SHA512d3594e895451a3ab3e7e38763fc0cf329cdcc611978dd839541b77e6a046482a9dac27dd680d695c3410efb5f5a61553d87a0c6dc500deb80aebb62ba8f243e2
-
Filesize
216B
MD5bfda311b0b0407d46eb86df615e6c513
SHA165a73ea28fc65bc55acb6f808c36b8ff70650604
SHA256164b3bace690c6acc790a51db7a8cc2bfb5925305ede7e2790f6cfaa9a32bae5
SHA5129683ef88d5ddbacef45af1b91896eef75258f1bf8d8069f7ec5ac0c7ea45468259f6a700c4466cd7065e096cb86b504694cdb374d1fc45204e46088f95aeeb4b
-
Filesize
80KB
MD56307d829ec9bd1019a9e8aab80102ebb
SHA11f36b9260f4263b9ac0575ceb7965534324ee7c6
SHA256bac5f93ec3839858fed25bb4d08b3d834bdec501cfeea1e1cc4fa0712f970629
SHA5126bac1477a0d753131f6283c8d63a37b70f33902f760bfc7152467365200c197ae65d656110c4a670e19edcff9098453d40987cdfbdb872347647c17b2d3d70cc
-
Filesize
122KB
MD5d5efc15292ffa32e9d270e584c757e15
SHA15f2863ab932ccbae26d03c5191f0a87a0057f089
SHA256bcce814419d66464235798a54d5e0969a5100f185ebf09f638b8cafaba6b16d4
SHA5124bbd7cc93d9c0c22ee9ea2f75af8751baa48d94fb8ff23fd8dc0743fdcf2a589a731ae11cf1b3d5fec08e26a5f7798553dc38a73b4fa15e5a7c0420b79c27c7b
-
Filesize
91KB
MD5fe07ae509b12dae629d473f1e259e65c
SHA18ea2433f0ab84f357a71dfd30e6624116746b0bc
SHA256cb7c5e8ac5aab640e432e90898de9c1c69215730c94bbec2ad4d6424c7d8fb55
SHA512d3dab4bf831d41342a259b6de5d41f20b345c11b972d580fb3a6c2653d72d4e66434cf5d466c0673f3543d97c38d1ec0f7124c5ed2127c35fab61e89d2a322bb