Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe
-
Size
252KB
-
MD5
da6f2a9f953173794446b843129f0d38
-
SHA1
6f9077ad5c2515cddb41a92c2bf3d249e7105c51
-
SHA256
e9b79a60f3a5d277e034227648baa8a0e7211919f0563c4b6f5951dbb3d1c0f3
-
SHA512
d3c6edd5ad1bc718926c1fd79951cf9bc3410292f17cc9430d4135b84a256549ede87947735a7abbe54cf6f86c71b58cfed61c74b8eda49c08ebd139c2fa730f
-
SSDEEP
6144:VlzknoBcRzrWsJywvP6bQ7yMP+DE827OaFSEpAC:nAnZRzJT6b7MP+Dd2iafpAC
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\inf\ram32xp.dll da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe File created C:\Windows\inf\ram65xp.dll da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2080 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2080 AcroRd32.exe 2080 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2196 1732 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2196 1732 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2196 1732 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2196 1732 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2196 1732 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2196 1732 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2196 1732 da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2080 2160 explorer.exe 32 PID 2160 wrote to memory of 2080 2160 explorer.exe 32 PID 2160 wrote to memory of 2080 2160 explorer.exe 32 PID 2160 wrote to memory of 2080 2160 explorer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da6f2a9f953173794446b843129f0d38_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "c:\FINAL_TBF2.pdf"2⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\FINAL_TBF2.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e41db61a4bef850aa533c11f4899fda6
SHA1df55da819f00e62a2cad3ac858b5ab6ec6d78890
SHA25673ed4ade7792295d48e995312032f388fe486cacdf9d116fac6a56ccda4fa29d
SHA5120a88cbfe995ff045aaf5a91beb851ee1f0d4ce3022a2c2214f30aa0de7c6f7cce03f0e5ceca683f4b61ff42279181f45731fd846fc2179145cca071c2b072af4