Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 08:59

General

  • Target

    d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad

  • Size

    71KB

  • MD5

    d18feac67d89b9a9a2460ec6601f1816

  • SHA1

    8cd461b073976bb727d2c5de52a3bae1b122367b

  • SHA256

    2de720e0a673d573a5403aae2c88444d8b6cfea4c558dc8a4b6a000d7dfebde2

  • SHA512

    e1387778d568fb57af67e8b36e09c4aeda9a0ed94cfc01eda02f54c53e688b4d731c58bde1e48ecc5ad035b650b02af90c491aca23c27f6a141369f0db900496

  • SSDEEP

    1536:exY2pxBWG1vAxhEopD9f9ggnsYOOIDiKMa8SOsej5WS:cVhYVFl9xNOQiZOseFWS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d18feac67d89b9a9a2460ec6601f1816_JaffaCakes118.jad"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f53d670d2a84bcf37b75a071051bb7dc

    SHA1

    6a2f1a16c92886b19ab3c3905f5e78bb2bd1cd4d

    SHA256

    2bbae8332b118b8e4dc82443cc105eecdb5e1a39755eaa4a7af3d86efc981fc4

    SHA512

    709328daf8c0fdd57022e817a98d32a2b1e93fd235278d46ffc33fe897bfbf73162eed482480524b44856bc89ec330ca63260679a565f7b2282054fdf66f41b5