Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
d0a634e9725a0cb5c0a1a5c7a9335ec8_JaffaCakes118.jad
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0a634e9725a0cb5c0a1a5c7a9335ec8_JaffaCakes118.jad
Resource
win10v2004-20240802-en
General
-
Target
d0a634e9725a0cb5c0a1a5c7a9335ec8_JaffaCakes118.jad
-
Size
8KB
-
MD5
d0a634e9725a0cb5c0a1a5c7a9335ec8
-
SHA1
a85661217ba6add5b28209ebfcde1df47a12099f
-
SHA256
60e6e93279f8c81f83a0c8caa879f336a8a41cbd6daa25db41bc6ddb31b595bf
-
SHA512
017bcb22b84c24e68c49f5d684faf35cc6ab3562e0e87b800544e50842eaca2426d88d269e72bd37dcc15f2449d29f63f2e5890efa371e1f069e958fae58fbf3
-
SSDEEP
192:GZzNC+xI+kIyF/12QL23Yl8mS0tKg9E05TUMY1OTeZ:eY0TkIyF/0sAkXE05XwhZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\jad_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2848 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 AcroRd32.exe 2848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2264 1860 cmd.exe 31 PID 1860 wrote to memory of 2264 1860 cmd.exe 31 PID 1860 wrote to memory of 2264 1860 cmd.exe 31 PID 2264 wrote to memory of 2848 2264 rundll32.exe 32 PID 2264 wrote to memory of 2848 2264 rundll32.exe 32 PID 2264 wrote to memory of 2848 2264 rundll32.exe 32 PID 2264 wrote to memory of 2848 2264 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\d0a634e9725a0cb5c0a1a5c7a9335ec8_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\d0a634e9725a0cb5c0a1a5c7a9335ec8_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d0a634e9725a0cb5c0a1a5c7a9335ec8_JaffaCakes118.jad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD527d1bb1664def5af8817750b0711257e
SHA18abd9ef114a0161d95ff7be9929cb06a41332e0a
SHA256cb4fe0bd86f9808c87e931513b2b03169f0ac4e361181ed998252c83cb081bf9
SHA512e8c93018443b1e460518f71c57f2a75d568b8607535446441b9b82a4921087040d893f78e3f7fe4fa08b804dd68a36080ced54ce642fc19bacdd9a306ea9d1b5