Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 02:32
Behavioral task
behavioral1
Sample
c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
c21ba4c47155b0eec10cd5c1a0a7f616
-
SHA1
5d003a8c2bd56015769e876367cbf40b39823df8
-
SHA256
83656ff5ffbb33d129392ca7c3e0e3398de2f841494574fd96cb8d0c977f4157
-
SHA512
da1d11b1aa085775753e8c4bf16cf7ef28e0cf144a18d0026b9d4f130e5550286cb9b1096cd0aaf17d29fd082cf4dba9de009a006237f4ffc0ab9609029c0967
-
SSDEEP
49152:5onQRdCCH5FcctL5HBZJ8IOBEeWsMCBQHX/w+gl2Di5l0j2iFyk:5ocHHcctNBZJ8IOtRMCBQHXY+gcG5ejP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2864 hpukqtbdks.exe 2188 hpukqtbdks.tmp -
Loads dropped DLL 6 IoCs
pid Process 2852 cmd.exe 2864 hpukqtbdks.exe 2188 hpukqtbdks.tmp 2188 hpukqtbdks.tmp 2188 hpukqtbdks.tmp 2188 hpukqtbdks.tmp -
resource yara_rule behavioral1/memory/1824-0-0x0000000000F60000-0x000000000118F000-memory.dmp upx behavioral1/memory/1824-7-0x0000000000F60000-0x000000000118F000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\XiGuaPhoto\XGViewer.exe hpukqtbdks.tmp File created C:\Program Files (x86)\XiGuaPhoto\unins000.dat hpukqtbdks.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-7S6O2.tmp hpukqtbdks.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-D1FH8.tmp hpukqtbdks.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-MO9EE.tmp hpukqtbdks.tmp File opened for modification C:\Program Files (x86)\XiGuaPhoto\WICLoader.dll hpukqtbdks.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-SFT2C.tmp hpukqtbdks.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-8SEH4.tmp hpukqtbdks.tmp File created C:\Program Files (x86)\XiGuaPhoto\is-Q5CD2.tmp hpukqtbdks.tmp File opened for modification C:\Program Files (x86)\XiGuaPhoto\unins000.dat hpukqtbdks.tmp File opened for modification C:\Program Files (x86)\XiGuaPhoto\webp.dll hpukqtbdks.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpukqtbdks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpukqtbdks.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1824 c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe 1824 c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe 2188 hpukqtbdks.tmp 2188 hpukqtbdks.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 hpukqtbdks.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2852 1824 c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2852 1824 c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2852 1824 c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe 30 PID 1824 wrote to memory of 2852 1824 c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2864 2852 cmd.exe 32 PID 2852 wrote to memory of 2864 2852 cmd.exe 32 PID 2852 wrote to memory of 2864 2852 cmd.exe 32 PID 2852 wrote to memory of 2864 2852 cmd.exe 32 PID 2852 wrote to memory of 2864 2852 cmd.exe 32 PID 2852 wrote to memory of 2864 2852 cmd.exe 32 PID 2852 wrote to memory of 2864 2852 cmd.exe 32 PID 2864 wrote to memory of 2188 2864 hpukqtbdks.exe 33 PID 2864 wrote to memory of 2188 2864 hpukqtbdks.exe 33 PID 2864 wrote to memory of 2188 2864 hpukqtbdks.exe 33 PID 2864 wrote to memory of 2188 2864 hpukqtbdks.exe 33 PID 2864 wrote to memory of 2188 2864 hpukqtbdks.exe 33 PID 2864 wrote to memory of 2188 2864 hpukqtbdks.exe 33 PID 2864 wrote to memory of 2188 2864 hpukqtbdks.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c21ba4c47155b0eec10cd5c1a0a7f616_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\hpukqtbdks.exe" /VERYSILENT2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\hpukqtbdks.exe"C:\Users\Admin\AppData\Local\Temp\hpukqtbdks.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\is-SF1T9.tmp\hpukqtbdks.tmp"C:\Users\Admin\AppData\Local\Temp\is-SF1T9.tmp\hpukqtbdks.tmp" /SL5="$50232,548300,54272,C:\Users\Admin\AppData\Local\Temp\hpukqtbdks.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
982KB
MD535d7f7167a300feec8143ffec30091b7
SHA11d19b82f3a8c8241eae8f1e5ea63cc2b85ed6ef4
SHA256e2f2a266416542e8e28556f9ee4f86d5ccdce16c9afd35631b75759ecb8be66f
SHA51275b3cae7bef1b53abad73717a343bc37b88a260b930309af9d8dffe0bfc23f005562b6996fc2d610dcf717c481f8ee9c1389570a330226e7d11faa951772a958
-
Filesize
907KB
MD5c521d45eaaff83043a6aa1897ae6bdd9
SHA1dec16b61a669ffdd5f96d844a8816705bfcb65b0
SHA256511a5bc3ee04ab53686b1a80a4a2a7c380bf5fd5a76bfd7092f638794f907be7
SHA51292ce34993ff7d9ec9b95149e6c2dea11a17e1658ee1f1ce45c4371fecbe17376770ad1c749598749c17d976b85cfba736279ea1c841a74230cc7052285048447
-
Filesize
834KB
MD5e25719cce0f09a6a9469f9938c5bbc0d
SHA112ee46b8b074ae8005f3049ec2c17da63d3db8c3
SHA256f860e5c669593498501214479f6964c619942b3a1e783b2368e7212f941d60fb
SHA5128034b89797006f31092e04cbb0229b1d3d776a959e1be8c36f564f0cb21714dc5519c90abb944f5be49a77c31b98987aa1a38a1618a7d963a1c4f8217db42b1c
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
900KB
MD5f8b110dc2063d3b29502aa7042d26122
SHA11a0fd3db79eadc1ce714f6267d476ddbec0f5e79
SHA256e8730b0bf8f94cbb8babbfefb32cef8e8d19ec823f28c33a7d48c78589710762
SHA512f3125d3f575aff68105ebb3eadbce30547d34e12237d8ebbc555c6fe12bcc0a5ea85a38e26f2900d70af70ec07efde3b8cd65dc0fdada637496531245ea5052f