Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe
-
Size
151KB
-
MD5
cffac347cd8ceb676ab08e0136062553
-
SHA1
129799f048bf7c512422b01290b215737856850b
-
SHA256
34d71564b0e15927eab312674f55c4a8fbe0e5d0284b0ffb0a17de1d564cc125
-
SHA512
db7854183ba89da2255c76196a72b851ad27785f8a89f30ace775033c4bf09ca29a6d06f7eb8be3ce359deab1263bcec4f8daac9ec8fdb893eadd9646cd304ca
-
SSDEEP
3072:ucaJvW8koHjmX+1+0cxxsWEsJ0ifXcIp08MoeaGa7omOVd:ucaJuqVxYT52MZMaGVd
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\winxcfg.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\fetish bondage preteen porno.mpg.pif cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\preteen snuff sex rape with a stick hardcore.mpg.pif cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Napster Clone.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Lolita preteen sex.mpeg.pif cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - shower scene.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\aimcracker.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\XXX Porn Passwords.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\warcraft 3 crack.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\anastasia nude.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\chubby girl bukkake gang banged sucking cock.mpg.pif cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\virtua girl - adriana.pif cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\girls gone wild.mpg.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Winzip.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\MSN.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Flash Golf.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Cable Modem Uncapper.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot girl on the beach sucking cock and fucking guy.mpg.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\kill osama bin laden game.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Universal Game Crack.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Windows 2000.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\nude.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\14 year old on beach.mpg.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\illgal incest preteen porn cum.mpg.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AIM Account Stealer.exe cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cffac347cd8ceb676ab08e0136062553_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD568732f734c865caa453ae6a0eb9d9b6c
SHA13ed5d3ded11924b22bfd0b4f7776162702b27514
SHA256735e735749f33c72da23e6a96529e9939246d886a0b038ec0c5e605edfb103d8
SHA51248e4173d1dfadb5cc602ad51d8120dbaaabb0f6c2184ef782601a4b9f67af5aa4af8acdf2e54058de9828dd84803fe758191fb99eb57710c010b37435ccf9c09