Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad
Resource
win10v2004-20240802-en
General
-
Target
d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad
-
Size
71KB
-
MD5
d18feac67d89b9a9a2460ec6601f1816
-
SHA1
8cd461b073976bb727d2c5de52a3bae1b122367b
-
SHA256
2de720e0a673d573a5403aae2c88444d8b6cfea4c558dc8a4b6a000d7dfebde2
-
SHA512
e1387778d568fb57af67e8b36e09c4aeda9a0ed94cfc01eda02f54c53e688b4d731c58bde1e48ecc5ad035b650b02af90c491aca23c27f6a141369f0db900496
-
SSDEEP
1536:exY2pxBWG1vAxhEopD9f9ggnsYOOIDiKMa8SOsej5WS:cVhYVFl9xNOQiZOseFWS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\jad_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\.jad rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2136 2588 cmd.exe 31 PID 2588 wrote to memory of 2136 2588 cmd.exe 31 PID 2588 wrote to memory of 2136 2588 cmd.exe 31 PID 2136 wrote to memory of 2740 2136 rundll32.exe 32 PID 2136 wrote to memory of 2740 2136 rundll32.exe 32 PID 2136 wrote to memory of 2740 2136 rundll32.exe 32 PID 2136 wrote to memory of 2740 2136 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f53d670d2a84bcf37b75a071051bb7dc
SHA16a2f1a16c92886b19ab3c3905f5e78bb2bd1cd4d
SHA2562bbae8332b118b8e4dc82443cc105eecdb5e1a39755eaa4a7af3d86efc981fc4
SHA512709328daf8c0fdd57022e817a98d32a2b1e93fd235278d46ffc33fe897bfbf73162eed482480524b44856bc89ec330ca63260679a565f7b2282054fdf66f41b5