Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
d1fb64e7bae9956e7acd17569d86d6b4
-
SHA1
6f00ae07b018e1109cadb50906edc352335ebafc
-
SHA256
09836b9e8b448fb1b366782468c7a1b0ee4f94d76b8f83113b0c406b4812bac1
-
SHA512
5fbf36ce85ba9e254f267eb83d6821b924c8dbbecbb8844755541a3f4d8f42975af8a1c50d4d70e2692bfb9028e96b30f7302b0b03e5a456a9cbcce94db728d7
-
SSDEEP
98304:AVlt6e/13GubI7bnFap+Ez4hAOpsumXOLBu6RvMGGQ:wSSZbI7bG4KOG+LBjMGGQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4768 StartHtm.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\starthtmWeb.ini StartHtm.exe File opened for modification C:\Windows\starthtmWeb.ini StartHtm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StartHtm.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe 4768 StartHtm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4768 StartHtm.exe 4768 StartHtm.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4768 1900 d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe 86 PID 1900 wrote to memory of 4768 1900 d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe 86 PID 1900 wrote to memory of 4768 1900 d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1fb64e7bae9956e7acd17569d86d6b4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\emnl-win-mb2000-1_10-jcd\StartHtm.exe".\emnl-win-mb2000-1_10-jcd\StartHtm.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD53ffcf8e063d455ea43f84a95ba39f41f
SHA14426819a8477e7dd20595a97bca33cb370143121
SHA256ad9bd9f80f656c9049a663cbae13ed18a8f951e770f5a4ae4625f28c8231c340
SHA5125173ac4c1682dc76e388c819e2c9f825d7a78a4f03b7e3290e25c922c11f99c35a0a491e46fcdeb3b91180d96bd540536e70c45b23e91f8081932f36b757ba7d
-
Filesize
466KB
MD5e69f3f27ef6360d473925141f7ac8d58
SHA14714e2b72ace7de60e5c8a95b60114d58c40cb11
SHA25606c00b99cb1d8098e5503deecce0794d9d2df4661f5067d63000cb7d5c42fdcb
SHA512a81f27c466a58e44431ceb91ab6bf6426ee73d33ff2b589c8dfc4ec615a6cb60e6d6edc5c90f7002026d0378b1a108649a1aa0ea60ed6f5365d824a4db36af77
-
Filesize
5KB
MD54024712ff2da866cda32f450a7c17f7b
SHA163ca75896b001d0f772738f7c376935cfa020202
SHA2567ca490d11dc360a27df3f9beb489e5346258c077c99142f668875464b1d5a9fd
SHA512cfd02b52d3889686475cd0f9ce19e4b00833cb4fe2bfae372d55d437543a9d0ac60100fdf60851f6dfe237202c2a54468379c50a65c4b49b010fe16d99afcabb
-
Filesize
4KB
MD55bc854257762266481120111f32322f4
SHA1c403a9815431e6e0e2acf7d74501d1b909d5488b
SHA2563c0618bdc04cc7cfe79960dcc6b4ab668c25ada776eaaff2784e4453ba3a1630
SHA5121653236059e5e30011afef56e1de7a22bd84ba310076bd10d0a74f6c9afc8d95a92cccc3e8d2eb341d46ee705aec5defd39db52e01f3c42b4ea5c520d0b8b5d2
-
Filesize
511KB
MD5b2abb0383581350d5b2eb644129b58c7
SHA145671e5172f33aa29893a0c9212d4c92386808dd
SHA2563b5b22a5e9ec29f7533a4dc24909181b949adb468962d96bb570a044fb12d7b2
SHA512d2a18dcb0fdf09d7836fe2cd5e50bef2de7862d5cc52b9c198cd6646f62d2c839fbcea7c452fe520c8660b3531b415c005dcfb4bde07ccff696b13e51d0d09b0
-
Filesize
8KB
MD5f4b1995352179508147534cd8ef2d1d6
SHA1508592bc744a743e49d4bb9876f98ced85ad285c
SHA2568cdcead795791e7956816b6128013ddcdf3c9ac8d84ef64d6abfe8562543b0c9
SHA512dcc8f08e0ac2bbc8aae8f4413dfe30fb937aede4320ed37ec3ac4b96845e45bd2ecd092d24778d8e21e5a339e2be8dce1a734713d67bd17a2e2f639f6c5b0041
-
Filesize
564B
MD55b01c49e551b5e324bec145c6bf76de7
SHA15d7461b8d52e20cbd10acc08109a7aad891cbf54
SHA25644065a58fdc23dcdf4aabfb315aed2e0e50526fad2897b7e6b2e3bedbbff6dd7
SHA5123fcd319190ea188348b248b84de5b268ef7478bc2ac1105c72f0a8f810122db1949e42e25120912e9da7d56ac2a1a13d395f1620b65bd8ffe6d351aa47c9ad81
-
Filesize
4KB
MD51fc70e52f4da0728615876b740a99943
SHA19b274a8d411b565300f85d83144359b36ca99155
SHA256f641a75b965e8d8f5f48110fe09b7c97c6e813321c99e602df07ba7ea656d0ac
SHA5120a9d565f1a700913d9e9ee6cc42b7c48ea50985b2ec1a04d62eef0a6b64c0a725cd326cb1522159605f8858f1917fd8cce3170cba652e0488b31574db9eafab1
-
Filesize
7KB
MD5d3acff88d41cd52877d1a3034bf67b7e
SHA12a53189de63768e667f6de0b6c7142918beb52ba
SHA256156e1fa04e0bd280adc4917b8432e885bb35db8ce18adc762c0757f970a23f24
SHA512874ade6ec084dc4fe82601f4f45f2a2966881b48ae9b07b1a4fb5b69d7e9124ae9e8d893feba01be100965ff36ac4acf3bd31b4c5ac420decc637cb67a521117
-
Filesize
246B
MD5b7a833c25f848052d263646b8b4b0425
SHA1bc9b8a77d073ec96a7981c5446c5d1f6709d6de3
SHA2562fabd9e291fe21cc5005627fa6918842bb39be04789824a9dbc6743e02da449c
SHA5129afd7c684b2022d792b425fdc2437e0715a06a7d60841671503146545b4d30a714bd05326ee687b3c71246d2c35e1fb50030083cabd5ba0383158956cb755b35