Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe
-
Size
110KB
-
MD5
b06cbf34b9415f928d67807322f1288b
-
SHA1
056617f4e0285dba626b777a4c07b68765ee2802
-
SHA256
a23b259806c1a9ef0d246e3493411bc0f345e392832a731136baa67b7123218e
-
SHA512
9acadb3d66a9ae7d456631e16755d9d4c7cb9a9660081c77543cbc1a8a9696df942c4fb8e46f507b8fb205ce4c276fdfa12d2f5c9757fdf2f5cb7bbbc54d3017
-
SSDEEP
1536:+1koYuv0Sta8Xv2LraZYHDzc1AgZ65zIPKJ8x/iC5ul4:zu15XvcuiHgc52qC5uW
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Documents and Settings\\All Users\\Application Data\\remove.exe" b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Documents and Settings\All Users\Application Data\autorun.inf b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe File opened for modification \??\f:\autorun.inf b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe File created \??\f:\autorun.inf b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe File created C:\Documents and Settings\All Users\Application Data\autorun.inf b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b06cbf34b9415f928d67807322f1288b_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5b5e1f55f1cd449fe8e75be725366a213
SHA1f4bcb82f8eb7053ce989060dbb3db98aa1e9219c
SHA25681d81351e54dfe3ea1da905981c403683ba0d9412216066bfefb20e0bf97bdcd
SHA51288201b0421bcf9816d8462b7ffab4f50e4e8f8db4533f02f9b4e9939da8127259e5119a346e347dff77275e21254c6a518223107a43e6382d7e89a61f78801ad