Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe
-
Size
540KB
-
MD5
bf89df3b7763f3c0baf5007b66cac3fd
-
SHA1
a172e392b4ba06f066a386578e4313ad0c2e0021
-
SHA256
6360f77e91ffc89c3232fcf9edfa1807b235943107a06e386bc39b5fa42cc206
-
SHA512
de587daceb0adb7da2bb242aa1481ad07b26bf9c3c595b2bf6a61e3590a8ad5e90b3d16ad6a8a2ce4adcdc02f5a46e61d73aa739d4c046b46796166910bcb1a3
-
SSDEEP
6144:Yzv5oXpcFb5DRsNxIYf2GC2vaDjb2veepgFsk:mmZcZlyN/fFC2yDOve92k
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tazebama.dl_ -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tazebama.dl_ -
Executes dropped EXE 1 IoCs
pid Process 2044 tazebama.dl_ -
Loads dropped DLL 3 IoCs
pid Process 2444 bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe 2444 bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe 2444 bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\X: tazebama.dl_ File opened (read-only) \??\W: tazebama.dl_ File opened (read-only) \??\U: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\R: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ File opened (read-only) \??\M: tazebama.dl_ File opened (read-only) \??\H: tazebama.dl_ File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\V: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\Q: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\K: tazebama.dl_ File opened (read-only) \??\Y: tazebama.dl_ File opened (read-only) \??\I: tazebama.dl_ File opened (read-only) \??\E: tazebama.dl_ -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE tazebama.dl_ -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tazebama.dl_ -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 tazebama.dl_ -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2044 2444 bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2044 2444 bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2044 2444 bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2044 2444 bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf89df3b7763f3c0baf5007b66cac3fd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD50198bb5c017a274f86b5a94430d805ae
SHA14bcd0394cacc916e5738ac3f31c929f7bcbff786
SHA256fee5ae17c110f9c683adbb62e4b83721f96502dbf2255192fa26ef1c106a974d
SHA512bd79486f24ab3960c0d8c6bc570332fdcf363cfeec471aa7349d68ac8771fba2ced36774870674c267a480c59069eab76cfb48e22d1bebbd4965a2cbc5e2bd63
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
157KB
MD5fa22935c8671ac0620a88a118ad0628f
SHA19409fa63cda94161d3209a78d27d4d71bb461211
SHA256376741475c3f52294c70b9df6b441cec2a04981a31c316a1eb8d4d48d7c57851
SHA512c771a763a9819e33044c64ab378bc62972ed717603c42ac54f2dcc2ccdbb531c9cc46a0e89d4dd3327861eb77a8b3d84c6ab6e1c4cbb34872ce637c980f0fe80
-
Filesize
69KB
MD58ba404e90194c38541e324657e72f74c
SHA1ad9fda28f95b7747579a7fbb8a18e1d1e6311a49
SHA2568145e4c62390f9c55343cc6dadb790dc2cb9463c4f578fa57bf43f12c4720340
SHA5121f594ebb6b970c9cb86b97d642351106a52db407c6e90db7391b50e97a1136e5ba13aeec66c9b985192c377d8c5c70d3746a00f37bcc83855fea316cf8d82362
-
F:\$RECYCLE.BIN\S-1-5-21-2257386474-3982792636-3902186748-1000\S-1-5-21-2257386474-3982792636-3902186748-1000 .exe
Filesize77KB
MD5f6ac55c35b0c8368ff0ba8f9485d4ac7
SHA121c2bb4b5e18bcd540339bcbc58b238ba5367ff2
SHA25611cc5c6dbfd59a560699dfec15d8d192af43b564bdb4f76ba9f538044bbd1b3a
SHA5125198a4bf5b50ae050887697fdb07cfd7a6eaeb8656992780f0847ffe5e916cc57e2ebb2ea66417f5fdef63772c831431239a256b9a47de1cd701f924d73f496d
-
F:\$RECYCLE.BIN\S-1-5-21-2257386474-3982792636-3902186748-1000\S-1-5-21-2257386474-3982792636-3902186748-1000 .exe
Filesize157KB
MD50a2536158c10d460231b7a579c4eaf8a
SHA18fd9e71989dab101ec9a92dea7b457cf3934e0e9
SHA256607b37696ba3e28456989e56021b677605e12a6ec0f52287af052f319f51927d
SHA51206ed22409fc3a4f61efd42f18849fd61ca3f09a89c9f4cf26878a0bf343b9ce70d6e5af2d94194f5940a8026a2ac79bb83a1333ed17647d990059eb944ee2a42
-
Filesize
157KB
MD5e1c19ab2298c78b556f85ce108730a5b
SHA1ba50e25bbc6e560d1a34dce51f562a9921215c6d
SHA256b8977b50aef0f819b2444a6e20cb1059505f75e2f9725f72c19c01ab95076c6a
SHA512789c3a02207ed0ec549f9b8bd4d8be99687f29be4e98429dc5167376bb1a2f53470d31e250e7bd11607acb8468913bbcf879d90909e23ee1fa1cce41c802c01d
-
Filesize
157KB
MD5ef1af1460c894f8ba9082f41f4f265aa
SHA11b623a65eb1c645057c93f180514195971a8ad6c
SHA2568c06d18f8abec74f1b0cf4068047e156dea936af690c6ae20a6fcb84f149e634
SHA5122118d3e2e3afb68a9c934dedc410bfb4e052ffb7323fb6b862c8ea0ae7b30e92ab6316abb1ebc35b3521ac3dd8cddea979e270735a73e1e134b2454c52c6479b
-
Filesize
32KB
MD5b6a03576e595afacb37ada2f1d5a0529
SHA1d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8
SHA2561707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad
SHA512181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c