Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe
-
Size
245KB
-
MD5
d3e5b7615e21411061c646ca6cad844c
-
SHA1
467d9819a37dfe8bd7ec813332096134b634848e
-
SHA256
4962e73c98eb6bba5ba9024a24f77c69cf73d53e067b70c252f37047b4fa8363
-
SHA512
58ded0fac72c5812848af0c6e305389dba1cba1f465eae82797249dfb922ed3de5a61c78d0f43d4e56261e8dad4d25648c92b6ac6e8a54da75075cdf9781176b
-
SSDEEP
6144:XgIeSFrCW39Eeix/XIGoPaiKe2lgg4EJjc9hk1O:XgIeMOWtELN+PnKem4EJjc9hoO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tazebama.dl_ -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tazebama.dl_ -
Executes dropped EXE 3 IoCs
pid Process 2052 tazebama.dl_ 1208 BCSSync.exe 3052 tazebama.dl_ -
Loads dropped DLL 12 IoCs
pid Process 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 2632 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 2632 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 1208 BCSSync.exe 1208 BCSSync.exe 1208 BCSSync.exe 3048 WerFault.exe 3048 WerFault.exe 3048 WerFault.exe 3048 WerFault.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: tazebama.dl_ File opened (read-only) \??\I: tazebama.dl_ File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\X: tazebama.dl_ File opened (read-only) \??\W: tazebama.dl_ File opened (read-only) \??\M: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\H: tazebama.dl_ File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\U: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ File opened (read-only) \??\K: tazebama.dl_ File opened (read-only) \??\E: tazebama.dl_ File opened (read-only) \??\Y: tazebama.dl_ File opened (read-only) \??\Q: tazebama.dl_ File opened (read-only) \??\O: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\R: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 584 set thread context of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE tazebama.dl_ File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\INFOPATH.EXE tazebama.dl_ File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\l8mTbQx6.com d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2728 584 WerFault.exe 30 3048 1208 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tazebama.dl_ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCSSync.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2052 tazebama.dl_ 3052 tazebama.dl_ 2632 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 584 wrote to memory of 2052 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 31 PID 584 wrote to memory of 2052 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 31 PID 584 wrote to memory of 2052 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 31 PID 584 wrote to memory of 2052 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 31 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2632 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 32 PID 584 wrote to memory of 2728 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 33 PID 584 wrote to memory of 2728 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 33 PID 584 wrote to memory of 2728 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 33 PID 584 wrote to memory of 2728 584 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 33 PID 2632 wrote to memory of 1208 2632 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 34 PID 2632 wrote to memory of 1208 2632 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 34 PID 2632 wrote to memory of 1208 2632 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 34 PID 2632 wrote to memory of 1208 2632 d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe 34 PID 1208 wrote to memory of 3052 1208 BCSSync.exe 35 PID 1208 wrote to memory of 3052 1208 BCSSync.exe 35 PID 1208 wrote to memory of 3052 1208 BCSSync.exe 35 PID 1208 wrote to memory of 3052 1208 BCSSync.exe 35 PID 1208 wrote to memory of 3048 1208 BCSSync.exe 36 PID 1208 wrote to memory of 3048 1208 BCSSync.exe 36 PID 1208 wrote to memory of 3048 1208 BCSSync.exe 36 PID 1208 wrote to memory of 3048 1208 BCSSync.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\d3e5b7615e21411061c646ca6cad844c_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 1364⤵
- Loads dropped DLL
- Program crash
PID:3048
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 1482⤵
- Program crash
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5adc6a74f04047aa2f54076b807b497c8
SHA1d93c761dc4f088a680a45b48fe7735dc0dd23145
SHA256afbf9bc53f9315cc949791e5ee1a3d9912d50ff4ce0aca347e43803eca24ecd7
SHA5124b99d359acf7d2d0266b38f95299c784ab5209f23caad2bff6b74fbfa0ba0fa05528e511f0f182860e22c10b03bbf92ec03a1e811364926f70979bfc3a8ca171
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
152KB
MD5aaec133300fcbe94ea3fee9faebc4d17
SHA1d4a8dc1c8a8bcf58afb22f31e32bcfa788f728cb
SHA2568db72faf8748a6c9766e9e2884a147f34ad14e61d8515c0ffd8dda75f4e03b75
SHA512bf58840f17c13d23b7d6734cebc15706024e9d806781f3af1a665168e4abb988d7c1dc2adb2c5ac84673fc1b61ac309ae8c542bf0512286d4b683b586d53bd16
-
Filesize
69KB
MD58ba404e90194c38541e324657e72f74c
SHA1ad9fda28f95b7747579a7fbb8a18e1d1e6311a49
SHA2568145e4c62390f9c55343cc6dadb790dc2cb9463c4f578fa57bf43f12c4720340
SHA5121f594ebb6b970c9cb86b97d642351106a52db407c6e90db7391b50e97a1136e5ba13aeec66c9b985192c377d8c5c70d3746a00f37bcc83855fea316cf8d82362
-
F:\$RECYCLE.BIN\S-1-5-21-1488793075-819845221-1497111674-1000\S-1-5-21-1488793075-819845221-1497111674-1000 .exe
Filesize151KB
MD591a8bce779c8408d10955bfb8950b496
SHA1f0ea5f0452ef811eee609fb8d49f19080c87571b
SHA25692b20a051d9e95de7c2aaf1a5d78cdd914c8d1ea5e73a124c6b267b8d313ea08
SHA512f345ae6d5c43a3efc9a8218d8fdfac398c4d7ad4210bb0ce3e8a65a5722106e404dfaabf8024db9bc5c5e8ada78504d2eed40828beba2857dbc1a23dfbdaeacc
-
Filesize
151KB
MD5f529b0f248564d09e25e4b5e9512a1e6
SHA1efa8a91c9d7a994cea1a80cd3a96dc02a16736c9
SHA256c469346a0134de75110559132779768473662e46df00918737270f57234c5e8a
SHA512b56409adf4e61add1293d20a815429fe36e3838ce17cae1fa34bb47a2565c582c3d50a9a6d18fad04b4e3b716bb03dec1e34ed8bfbba58f8cf2d2970b1ae3d58
-
Filesize
151KB
MD53c6a1378d093ca1c414347a8cc415f68
SHA1b89e93fc5e4f6d80289c3a7ac10fce755a90422f
SHA256034d9a3fc2ee00c5e567e3700be794ec77e4a5d83e29c48adbc3969866c8eecf
SHA51264cca142c339654eff92bdea57938d2933f8233efdd64ad0588a92d450318d04e82afb163214f451f4e8d049cec4ac15861d3b0e18081c8b65cee6a17ebc05df
-
Filesize
245KB
MD5990ab83677953acf05804b9834d3e1c3
SHA1b1b0e423a5dc62abf387f269d51addbaeb3a084f
SHA2565f6109f6beade116134c74a3cc3c493c48384bcc44cd12758096a57b30665725
SHA512ebb50dd2fdec6d8083a248905bb40124bb902cefe720ad2ad9fa4070b799265cdc4972763f834ec8e3162f5f4a7250d4bbda5373db93fbc38b27840b451316ca
-
Filesize
151KB
MD5a902beadfaeceacefb2bdf6cff750df7
SHA17da443bd9a3dc51985a4fcd8d5cbdfc4d2ae0fed
SHA25643a634019e72b71a89a9904431b538f90350cbc468c67379cfc13db8fa19c1a1
SHA5128709de4645f093598b3db692ef26b1e4fe34ead26c27e6da92d326aba70f7d3e50386d4e0359e56e0e0f88ca65f7a2a02daf0a6384462e81e9d7880d0463e464
-
Filesize
32KB
MD5b6a03576e595afacb37ada2f1d5a0529
SHA1d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8
SHA2561707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad
SHA512181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c