Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
c07dd8ab86d894a16888e39a9331d815_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c07dd8ab86d894a16888e39a9331d815_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c07dd8ab86d894a16888e39a9331d815_JaffaCakes118.exe
-
Size
177KB
-
MD5
c07dd8ab86d894a16888e39a9331d815
-
SHA1
7cd1ea757c244ef50fd7f8c4502ff51b3e050b40
-
SHA256
3342812bb66a2aaf663793b9d47b98eebfc4b74a5de80fe94f5931fc407cf777
-
SHA512
25bdbc0c722d43f6f2393b90f6eed484779b1bbd905d1fb9f0091b8e621362ac7ccd3cc5fc6a67ab4b250d4541b73c2ccdb22297c0818b80a38d02b483be3213
-
SSDEEP
3072:YaU7z2I0vsmCNAevF8LlFgWapU7Tl4n6mAD2qFlJwhUS2n:Yb7T+g27hoSDZFlGhn8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2828 qlues.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: qlues.exe File opened (read-only) \??\U: qlues.exe File opened (read-only) \??\G: qlues.exe File opened (read-only) \??\I: qlues.exe File opened (read-only) \??\N: qlues.exe File opened (read-only) \??\O: qlues.exe File opened (read-only) \??\P: qlues.exe File opened (read-only) \??\R: qlues.exe File opened (read-only) \??\H: qlues.exe File opened (read-only) \??\J: qlues.exe File opened (read-only) \??\K: qlues.exe File opened (read-only) \??\Q: qlues.exe File opened (read-only) \??\S: qlues.exe File opened (read-only) \??\X: qlues.exe File opened (read-only) \??\A: qlues.exe File opened (read-only) \??\E: qlues.exe File opened (read-only) \??\M: qlues.exe File opened (read-only) \??\Y: qlues.exe File opened (read-only) \??\B: qlues.exe File opened (read-only) \??\L: qlues.exe File opened (read-only) \??\V: qlues.exe File opened (read-only) \??\W: qlues.exe File opened (read-only) \??\Z: qlues.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\D56A181D = "3934173624" qlues.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c07dd8ab86d894a16888e39a9331d815_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c07dd8ab86d894a16888e39a9331d815_JaffaCakes118.exe"1⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\qlues.exeC:\Users\Admin\AppData\Local\Temp\qlues.exe -svc1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies Internet Explorer settings
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5c07dd8ab86d894a16888e39a9331d815
SHA17cd1ea757c244ef50fd7f8c4502ff51b3e050b40
SHA2563342812bb66a2aaf663793b9d47b98eebfc4b74a5de80fe94f5931fc407cf777
SHA51225bdbc0c722d43f6f2393b90f6eed484779b1bbd905d1fb9f0091b8e621362ac7ccd3cc5fc6a67ab4b250d4541b73c2ccdb22297c0818b80a38d02b483be3213