Analysis
-
max time kernel
18s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240802-en
General
-
Target
ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe
-
Size
789KB
-
MD5
ae879c03604460a9b75c4f2e8bbbdf04
-
SHA1
251af5e14d8a1fa245cc25044b5722e8b46c0b2d
-
SHA256
607172e9a827f5f99054cc6eebaed1dd623d8f7f96a8a533ef14aadd0177e74c
-
SHA512
3d75169449577c57e23926fb8fcd1101782dfd84dc03d738d1bc536f04aedcfe3e9661725d82fd953c52f5aae8b46a7661e0f47b61fde77ac2eb8f5e43fcdb68
-
SSDEEP
12288:0tobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44E4:0t8RHjEgYAw1hZlZTWQu7igcyKPEujZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2248 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2248 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2440 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2440 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2440 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2440 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2440 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2440 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2440 2452 ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 29 PID 2440 wrote to memory of 840 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 32 PID 2440 wrote to memory of 840 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 32 PID 2440 wrote to memory of 840 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 32 PID 2440 wrote to memory of 840 2440 internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe 32 PID 840 wrote to memory of 2248 840 cmd.exe 34 PID 840 wrote to memory of 2248 840 cmd.exe 34 PID 840 wrote to memory of 2248 840 cmd.exe 34 PID 840 wrote to memory of 2248 840 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/ae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nseACC.tmp/fallbackfiles/'2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\31919.bat" "C:\Users\Admin\AppData\Local\Temp\25E201EEEE6A486FB51394C95B3FBCB9\""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2248
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD5b0424849698ad4ada2a4445e7051bd85
SHA15ff8320b0ce90534558013004c7d2c2d6a4e4892
SHA25623f31ed020f580c5f7e03a64f7f41b08db7f55027ca45012e27415c1761da83f
SHA512af5752b82aa207c1099c0aea901dea3d26f32bc4fbbd6e2267765b92bc065a1b46ec32eb11a2b79357a69038a7f9acd06210a3dee3e149cf36ecb8c3e3886268
-
C:\Users\Admin\AppData\Local\Temp\25E201EEEE6A486FB51394C95B3FBCB9\25E201EEEE6A486FB51394C95B3FBCB9_LogFile.txt
Filesize9KB
MD5ead28df49613609da4a056aed95a29d2
SHA10e9611965b77d01bfcd4e061ce24c8f6c3f13a70
SHA2562c53182f35c068f88eb5c7a8446025f898d3e6d57ec7320241d2d3c7b1f52845
SHA512b7cebd9ca7da27d4c39fc59a8f3d76138537390a1e1928a8b9fec8729d766f88577b8a86df10af8a422f6d7238dbe15c57ea83f70da2cde41f3ff51eb04242ed
-
Filesize
119KB
MD509c69b1c9c5bae7605d329009d3c5c14
SHA11c48732dd5a2d064fcf36c528b15de46d7a27e56
SHA25685383894894eeaba7092293b36328ee67186e28c83c36fc75b26f22ad6766bb2
SHA51217eb3d18d25f08bb6e605201abeebbe038fd4558c9f5c6edeee29fc69c22c12e8b1ff6be43e296d4dd6eb9c60b61b685c63e87587f67e912b6405bba11f46caa
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
\Users\Admin\AppData\Local\Temp\nseACC.tmp\internalae879c03604460a9b75c4f2e8bbbdf04_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066