Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe
-
Size
155KB
-
MD5
c01b5406166614811c30d8750f16bce6
-
SHA1
45457c676c170bf4f89f63c42641ecc425e95a0f
-
SHA256
993c7758432f9b8ecc022931a3ec50a9ae5fcf7181ae54da2150b062e9f2fd4d
-
SHA512
ec9a07aa7157f0624de2432569c59e74496bba0c292d59f88e1475ea9fc5017efa3a7a6e0118a7cebd020fdec15d8e4b6a1d29143bbf07896633cbd86d341826
-
SSDEEP
3072:jmVW8iTX/3RfldjjXq1+0cxxsWEL02fXcIp08MoeB1KGaIo:aM7jJlRexYTHYZMtzo
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\horny asian warming her finger in her gash.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\stud fucking his blonde french maid.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two sexy blondes share a cock.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\blonde with titts and cunt sending chills thru cock.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\action with three chicks getting it on with a guy.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy brunette showing her bod outside the house.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\genuine indian slut posing.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\an asian bush getting a cum bath.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\schoolgirl deep sucking some cock.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\tenderonie who insist her pussy must always be free.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babe doing boyfriend and his buddy.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\black girl gets dildo wet.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy hot looking horny ebony teens.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Blonde and Japanese girl bukkake.mpg.exe c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\teen spreading in the kitchen.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\kitty-cat with horny beaver that needs licking.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot hungry sluts sucking cum for a line of coke.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Xbox Iso 2 Rom Converter.exe c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two interracial lesbians licking each other.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute blonde cheerleader dancing.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\busty asian with big lips.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cum hungry slut accepting goop.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\DivX pro key generator.exe c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cool rooster raiding hen house for hot babes, link city.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\MSN Password Hacker and Stealer.exe c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\supermodel nina brosh .mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\chick weeing in her pants.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\bottle blonde tramp sucking a dick dry.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy little blonde teasing.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sunbathing beauties tanning tender pussy lips.mpg.pif c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c01b5406166614811c30d8750f16bce6_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5f11d9787a4ea7c5eab29d3217eeb8b46
SHA1503e4469b57801381864ef19f778c8b6714f05c6
SHA2562ccc732df1e13d26b33813c463b6c7dfea888cf18b33ac2a1a9916d1812fcc66
SHA512e5c96d552c58665c7408f80c3fc368949e246ad5781f22b296f9c03ef38ef167c627c39aabd6704e40478e93c0c14d552c5bea55222805538ffcd190476daade