Overview
overview
8Static
static
3b31ccfe53c...18.exe
windows7-x64
8b31ccfe53c...18.exe
windows10-2004-x64
8$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3MadPea.dll
windows7-x64
3MadPea.dll
windows10-2004-x64
3aekz.exe
windows7-x64
8aekz.exe
windows10-2004-x64
8baae.dll
windows7-x64
3baae.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
MadPea.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
MadPea.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
aekz.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
aekz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
baae.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
baae.dll
Resource
win10v2004-20240802-en
General
-
Target
b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe
-
Size
253KB
-
MD5
b31ccfe53c49736376dcf64c99b38960
-
SHA1
eacfc9ae37eb2e8f4560d532ee70669b91f9fccb
-
SHA256
ff2594e55bb31a7db6d0059cc6066a2358d59a0d25ab89f4efacf8d2644c0af2
-
SHA512
048ffbdf262d2e3f1a336b0922448ce67f2dfaa96768118c8daa42ea11d3fb6d20e641377bcbfcb8b462f9a19e3ecabd94b7c3e0c96a3c4f0b1a1d495a66bc49
-
SSDEEP
6144:u2FwvQg2JnVVOXTnllzr1PiErVZMbNswsJiMI:MvJyV6xJQeVZMbNsw7MI
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mysys = "C:\\Program Files\\Messager\\aekz.exe" aekz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aekz.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 aekz.exe -
Loads dropped DLL 8 IoCs
pid Process 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 2572 aekz.exe 2572 aekz.exe 2572 aekz.exe 2572 aekz.exe 2572 aekz.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\somarshal.dat aekz.exe File opened for modification C:\Windows\SysWOW64\mprmsgse.axp aekz.exe File opened for modification C:\Windows\SysWOW64\domspring.dat aekz.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Messager\MadPea.dll b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe File created C:\Program Files\Messager\aekz.exe b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe File created C:\Program Files\Messager\1.2.8\MadPea.dll aekz.exe File opened for modification C:\Program Files\Messager\1.2.8\MadPea.dll aekz.exe File opened for modification C:\Program Files\Messager\Config.cfg aekz.exe File created C:\Program Files\Messager\baae.dll b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aekz.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2572 aekz.exe 2572 aekz.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2572 aekz.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2572 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2572 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2572 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2572 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2572 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2572 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2572 1476 b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b31ccfe53c49736376dcf64c99b38960_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files\Messager\aekz.exe"C:\Program Files\Messager\aekz.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD50bad204155a6281c8328fcb630e1dd4a
SHA11d4dd1f0829454cef4c11322a76e7a9c635ad412
SHA25611a2b77cdd221606b13176ef9989f05c037489c069464b12f69d16d35019d4b0
SHA512458a9f5a3fda26bb468da65d5b4695b350c25c33c14ff34f6b859b3741142b22fff4d039ce62f47d004381f6707e8ff4e27240248c32ec0dee4ada3e78e0bbcd
-
Filesize
32KB
MD5c7409bb97732b4e975195609f462dd29
SHA19a1c81f8931c1c3c359a6f137459e00684c81b75
SHA2569ad9d997901d3bf447bb3a4088f613b6494a875b0f98b2c45010078fc620b0c6
SHA5120567d286600dfc38e12e9042563a5e0cca4ddb1bff017db58f728376b81bcaa10c5af0f54c921909f9306bee0be6b6cc04fa4964c14e4c742148681a490bccad
-
Filesize
342KB
MD5f41517d0afd7c7280da8e51da9c6433e
SHA1a02a06ef8649578c1f0f9ebfdacb3cbb9949997b
SHA2565d4b1c54118c5d7da3da7d0bb97a3ee2b1f0c5761a4aa8294332035fcf410589
SHA512fb16561945cfb9d266096fd855ae8d246311088015e4fc2ef33bdf88ca6b85c6878b6b22ba3168487c626d221b14c6cfc911f7004567fa18ffce9ed8f7fee740
-
Filesize
10KB
MD54eff5fafd746f5decb93a44e3a3d570c
SHA1a11aa7681b7e2df1c7f7492a127d332d1495ea8a
SHA256cf61ddd15d63c25a12caee70f51ea736cfc02195c42e56ee01b33f689d3754c5
SHA512cde82d2a1f28506e4c2264f6b82017a00af32f138ebcdbaf4cc58463870fa626f708aa57465294c5a6f096c886841e7b9112b85bf3ea2f1d8f2da816b51b2d72