Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
d17dd5050c9a4eec4903767376829500
-
SHA1
0b6599d18ffda4baa21f4bc09ae9e168d9eee802
-
SHA256
2b64e39e9ab434dd665ac078b8626f093af9933d051972099f0a9599da1c5f26
-
SHA512
45239813b612f821bb2491511fdeb77cd566851857c5dbf6f90191fe4a864eb5f23960f5a2b8c3f23ab01a50064e03a5b3e4409fe876306d8453f60a9b8c3476
-
SSDEEP
24576:EInXgjK/K6dipju3/YQX24Fu+WqAH2k8bQpZrdETYl+nfTQxij6IbIcL:EINSRjuA02J0zbQLrdEi+nfTQxijnpL
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1544 attrib.exe 1016 attrib.exe -
Executes dropped EXE 3 IoCs
pid Process 2652 ctfmon.exe 576 ctfmon.exe 1812 ctfmon.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File created C:\Windows\__tmp_rar_sfx_access_check_259411753 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\clusio.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\jerltybit.crt d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\regedit32.key d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\stc64.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\stc64.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\syskern32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\syskern32.dll ctfmon.exe File opened for modification C:\Windows\ctfmon.exe attrib.exe File opened for modification C:\Windows\syskern32.dll attrib.exe File created C:\Windows\jerltybit.crt d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\rasptq.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\syskern32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\ctfmon.exe d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\otrux.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\libeay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\ ctfmon.exe File created C:\Windows\ctfmon.exe d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\install.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\clusio.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\install.bat d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\libeay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\rasptq.sys d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\otrux.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\regedit32.key d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File created C:\Windows\ssleay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe File opened for modification C:\Windows\ssleay32.dll d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1512 sc.exe 2712 sc.exe 2820 sc.exe 1296 sc.exe 1808 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 576 ctfmon.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1036 2644 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1036 2644 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1036 2644 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1036 2644 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1036 2644 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1036 2644 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 30 PID 2644 wrote to memory of 1036 2644 d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe 30 PID 1036 wrote to memory of 2712 1036 cmd.exe 32 PID 1036 wrote to memory of 2712 1036 cmd.exe 32 PID 1036 wrote to memory of 2712 1036 cmd.exe 32 PID 1036 wrote to memory of 2712 1036 cmd.exe 32 PID 1036 wrote to memory of 2652 1036 cmd.exe 33 PID 1036 wrote to memory of 2652 1036 cmd.exe 33 PID 1036 wrote to memory of 2652 1036 cmd.exe 33 PID 1036 wrote to memory of 2652 1036 cmd.exe 33 PID 1036 wrote to memory of 1496 1036 cmd.exe 34 PID 1036 wrote to memory of 1496 1036 cmd.exe 34 PID 1036 wrote to memory of 1496 1036 cmd.exe 34 PID 1036 wrote to memory of 1496 1036 cmd.exe 34 PID 1496 wrote to memory of 936 1496 net.exe 35 PID 1496 wrote to memory of 936 1496 net.exe 35 PID 1496 wrote to memory of 936 1496 net.exe 35 PID 1496 wrote to memory of 936 1496 net.exe 35 PID 1036 wrote to memory of 2820 1036 cmd.exe 37 PID 1036 wrote to memory of 2820 1036 cmd.exe 37 PID 1036 wrote to memory of 2820 1036 cmd.exe 37 PID 1036 wrote to memory of 2820 1036 cmd.exe 37 PID 1036 wrote to memory of 1296 1036 cmd.exe 38 PID 1036 wrote to memory of 1296 1036 cmd.exe 38 PID 1036 wrote to memory of 1296 1036 cmd.exe 38 PID 1036 wrote to memory of 1296 1036 cmd.exe 38 PID 1036 wrote to memory of 1812 1036 cmd.exe 39 PID 1036 wrote to memory of 1812 1036 cmd.exe 39 PID 1036 wrote to memory of 1812 1036 cmd.exe 39 PID 1036 wrote to memory of 1812 1036 cmd.exe 39 PID 1036 wrote to memory of 1216 1036 cmd.exe 40 PID 1036 wrote to memory of 1216 1036 cmd.exe 40 PID 1036 wrote to memory of 1216 1036 cmd.exe 40 PID 1036 wrote to memory of 1216 1036 cmd.exe 40 PID 1216 wrote to memory of 1492 1216 net.exe 41 PID 1216 wrote to memory of 1492 1216 net.exe 41 PID 1216 wrote to memory of 1492 1216 net.exe 41 PID 1216 wrote to memory of 1492 1216 net.exe 41 PID 1036 wrote to memory of 1808 1036 cmd.exe 42 PID 1036 wrote to memory of 1808 1036 cmd.exe 42 PID 1036 wrote to memory of 1808 1036 cmd.exe 42 PID 1036 wrote to memory of 1808 1036 cmd.exe 42 PID 1036 wrote to memory of 1512 1036 cmd.exe 43 PID 1036 wrote to memory of 1512 1036 cmd.exe 43 PID 1036 wrote to memory of 1512 1036 cmd.exe 43 PID 1036 wrote to memory of 1512 1036 cmd.exe 43 PID 1036 wrote to memory of 1544 1036 cmd.exe 44 PID 1036 wrote to memory of 1544 1036 cmd.exe 44 PID 1036 wrote to memory of 1544 1036 cmd.exe 44 PID 1036 wrote to memory of 1544 1036 cmd.exe 44 PID 1036 wrote to memory of 1016 1036 cmd.exe 45 PID 1036 wrote to memory of 1016 1036 cmd.exe 45 PID 1036 wrote to memory of 1016 1036 cmd.exe 45 PID 1036 wrote to memory of 1016 1036 cmd.exe 45 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1544 attrib.exe 1016 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d17dd5050c9a4eec4903767376829500_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\install.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\sc.exesc stop ctf323⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe /i /u /h3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\SysWOW64\net.exenet start ctf323⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start ctf324⤵
- System Location Discovery: System Language Discovery
PID:936
-
-
-
C:\Windows\SysWOW64\sc.exesc failure ctf32 actions= restart/1 reset= 103⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\sc.exesc config ctf32 error= ignore3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe /i /u /h3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1812
-
-
C:\Windows\SysWOW64\net.exenet start ctf323⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start ctf324⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
C:\Windows\SysWOW64\sc.exesc failure ctf32 actions= restart/1 reset= 103⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Windows\SysWOW64\sc.exesc config ctf32 error= ignore3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h +r C:\Windows\ctfmon.exe3⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1544
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Windows\syskern32.dll3⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1016
-
-
-
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310B
MD51fcf9ba087443dff8bea77207ee82653
SHA123b90c44e17d0296a481322a4bc497f39fc4388a
SHA256d0228d2508e9187c56b9f0b032f6d28cc5cbb10667e1e12d9fa82f32ded7071a
SHA5127427969b398e3080836e03f175bc017ee1bc55cc1023b7ce7218581b3ec6c75c9a4ed5d3ab2625a37b1a75c3c97561cd14bda4a96f0196ec3a55607cc39ae114
-
Filesize
972KB
MD5a97d57906b9427d2d76c1e24d8efc36e
SHA16d1fef4409bb45a3b03c4d8f1eb5faefcc9363d2
SHA25671f870d447bd74419d718e28c9ed8a3c3a47e9f0ff8f852cb8790903e5d5d50a
SHA512ccb1e1fd83e5d22bfab061373308918d533041b92b46d768e0b410074fafa0893cc8c63a021eeb6ba97f42becbdce8666a60166a588d2340896855d9d22b77ab
-
Filesize
575B
MD525536ecd5e85d2e751c50d9fc448d5b1
SHA17950fc3f1ba078147844b1157ff9c62ddaabf887
SHA2564e87787cf54db726dc00b9b5ed90f09cb293d81fb3a1b0af160a8674970c92d2
SHA512b695f588d9bb64d4df4a7be1981fc644cfabb5967ac4427548a7746ca9f57cddecaf2512daf67d917d2d31f4e32a0116b834ff88675c7cce93f1088e1397c1c1
-
Filesize
973B
MD57b8fa286633f087b2faf9a9584dcc72a
SHA1d1845d794abc47f610e88aecdc55b7fb31cecfc8
SHA256015c0cdeb93d4b5ed1c7ee1719be6136eaf871dbca5f9fc7c24492093e6b1712
SHA5129756e14708d370ad20f4ad8ff8cc8f739e5575d7a6049fa6fb1af8936e43d764ffc2fb5cf515e127a2644329b4bd953a6237294e8c60097f5800f6b639cf63b6
-
Filesize
828KB
MD5672fe0788779d4b30b8bec4efb32352e
SHA152f9eaf79480602759961346beac9489a6b4a13f
SHA256b23cdd7e1189750e3b68edfa2402b00bb92a8a9fe303ad44cab4a33f07d957b8
SHA51250d8fbb0564642ded75818c5fdbf52e1783e7707afcc4f9f44959b81be7cfe3c210b93d2e563738b94ee53d88132700e090678402527c38d9a2b0cf13afb9d66
-
Filesize
1KB
MD58dd2f2a1e98900b79d67541f7656873a
SHA165e6035530cbc8b19deb6dd678fa64cd6552dc5e
SHA25626e6462fed6f154a3e09a17338249af30feab16a9636560c5d7e31f6cf566704
SHA512408a5ffee18e437cced77ee9cd76884ce909bb92f7fd4b0262c52a1c79165055f4020966a74bd09d4046e770b0a324f3d13cc66e1b5eba72bef9a83d387bcef8
-
Filesize
963B
MD52293486183632e8634aa30a1798bc5e7
SHA16a75bae4369c16450858ace07d66d30f5a0532b2
SHA2561eb5b1f5a0c14f2602c61179c275b1e30059eb3c69e48821aeb44d4f06395576
SHA512b332f40791897b4dc3d83b267c9405da35cbebc521cabc2fc76bb906f45355b20d37696fee91d5b139f88aeba92364fda720b167bc6399078a2903a842bd1bac
-
Filesize
156KB
MD5fc7aff0c5c8d6ef7b24d6e73c754f8d6
SHA187a9b952f7ed5883b21bad39c40d3b6cc58df3f2
SHA256c53e0fb93cee6cc865a109f7447c92020f3c05684507b93a763a1e6f77b2bd20
SHA5124e049ad03e65cb1d4a57c8e6c1c33cb882df69deafa89af5f23437886a611eb02d4fea6d7ca4d2b0a42892e821711fcae6cc1ab65714f307dbff945e5e68b563
-
Filesize
114B
MD5df01a7d9e6b061814a003672acfa0c21
SHA1065ed753b19efd9d28b264c394b3d6601c6d7a67
SHA256055738e2e2573f643980c409300ac1b9a71405a44f09060b55c9f2116c2f9b32
SHA512769b624f064f1d3a73040a954e49df1bf1eb47b400a2664ea89cc6fec211f8ed154d2965e6d4c36833ab7c09cba4f821711620dd68e329dbe2b6f8f260c7a15d
-
Filesize
454KB
MD503864469e5c2d96bff8449dfdb6354c7
SHA192583155a4a54f5a8e91123c6a7942991431a6d2
SHA25647be46532fcd21449ecfab8b9409fa62994f89a7cd6f230e168045a5192557a3
SHA512e1afdfc0ef5024467bf96cd1163e5490b9597ef65990a3b8085ebad4aa94355930614b137fddd5715ee0219e869e4f404816803c9afab38f4c8cdc295d7bd972
-
Filesize
454KB
MD5334007bd9b8317ab78aaedb31d4b3d43
SHA154e667825bed7f54b13596cd74bd86ccb4fb142f
SHA2564e23aebb8d9e54a9356b5fa895e79d5172b0d966ecc7c4939eee33fb0b0bb1f4
SHA512fb697a63f50f526424135b4fd5bbb7839decc604f7ad36751cf1167ecb23c7625614f7e3d86f7de76c81c4ac2db9c3f4d848f3811536c47d4a38600c68e9c844