Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/VirtualDub.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$TEMP/VirtualDub.exe
Resource
win10v2004-20240802-en
General
-
Target
b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
b1c5a88d32eaa3423576f31445413b37
-
SHA1
29f760c739630b0dc75ad376c46ecac6bff87da3
-
SHA256
674036a975467ebf675e7240947f4206c693ef68e125c71e1e410d33aae2f12c
-
SHA512
7b1a3b574c1f687de2dbc6394360e8534e44062c4018b60dfbb0d265a7167dc495dfca925fe2806ed484e6278ed81064e666780e4593a669eb9ca40d9674add2
-
SSDEEP
24576:bLmqqqHPAK1Ms/0sWAVGBPgbLbhSnCWcW+WlxLfCGHujAJ19HOB1YY1Hx6HiLnzP:Xmq5PRSS0/PgzhSZGaxJOjE+YY1R7za0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2708 b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1c5a88d32eaa3423576f31445413b37_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
754B
MD5739067096c1b18828e0ccec864aacfd2
SHA15e17938083adb7ab64d4cc7380192d11b973de91
SHA256fca6b7f04e3024dab992b9c5789b27d580deb7b44ccf5be24dda471e5cc0f573
SHA51296ec4b22c7123154db422ed19beb4d98da7c0edece60795ccd7eb5cb6cab2bc1a979ca7ad11ae661e586bc66a4dbc14ad4b5b276e5bac536d3dcfe89a4a8cc75
-
Filesize
14KB
MD5f2fc9770e2047526bc45553b940c02fe
SHA11a189e20eb573d99f4f18e0312dd79865d33f0ac
SHA256b85643e91344506caaeacf97d6ea6dfcf7d62a21b117a516e0162d8f22892639
SHA512b922d9dfc6653809fe6e5af8dfc12f5853d6226e15b0575a7a42c03ab6394773627ae7b63e9e0da72e462169f0f233e93a85082562bf5897bccc480e0be50162