Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe
-
Size
208KB
-
MD5
df17a4f4dcf052ffa5eaeed0c0fc7953
-
SHA1
5e8ee98d568490dbc1e0ada71c9e506b9c7cd829
-
SHA256
2bd314af81ffdcd875ba791d1eeb57b4c62d32dcf58ba833af121f50642a4ead
-
SHA512
b420c03b47905cb56f074538a2470c27862a46a6e184d8851594f143595dcce7490d1c870f8676bb1047302fc92ab8165544cf14e6e25063146bc1db0e5b8366
-
SSDEEP
6144:PWmwmDlC0uKZ413rRKl8kEcxFEjmtg3e:plEc4R3
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 512 jdownloader.exe 3008 jdownloader.exe 1284 jdownloader.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jDownload = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\jdownloader.exe" df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: jdownloader.exe File opened (read-only) \??\J: jdownloader.exe File opened (read-only) \??\L: jdownloader.exe File opened (read-only) \??\P: jdownloader.exe File opened (read-only) \??\T: jdownloader.exe File opened (read-only) \??\X: jdownloader.exe File opened (read-only) \??\Y: jdownloader.exe File opened (read-only) \??\K: jdownloader.exe File opened (read-only) \??\I: jdownloader.exe File opened (read-only) \??\M: jdownloader.exe File opened (read-only) \??\N: jdownloader.exe File opened (read-only) \??\Q: jdownloader.exe File opened (read-only) \??\V: jdownloader.exe File opened (read-only) \??\E: jdownloader.exe File opened (read-only) \??\H: jdownloader.exe File opened (read-only) \??\O: jdownloader.exe File opened (read-only) \??\S: jdownloader.exe File opened (read-only) \??\U: jdownloader.exe File opened (read-only) \??\W: jdownloader.exe File opened (read-only) \??\Z: jdownloader.exe File opened (read-only) \??\G: jdownloader.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 jdownloader.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3760 set thread context of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 2724 set thread context of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 512 set thread context of 3008 512 jdownloader.exe 89 PID 3008 set thread context of 1284 3008 jdownloader.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdownloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdownloader.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 512 jdownloader.exe 3008 jdownloader.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2724 3760 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 86 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 2724 wrote to memory of 928 2724 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 87 PID 928 wrote to memory of 512 928 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 88 PID 928 wrote to memory of 512 928 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 88 PID 928 wrote to memory of 512 928 df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe 88 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 512 wrote to memory of 3008 512 jdownloader.exe 89 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90 PID 3008 wrote to memory of 1284 3008 jdownloader.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df17a4f4dcf052ffa5eaeed0c0fc7953_JaffaCakes118.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Roaming\Microsoft\jdownloader.exeC:\Users\Admin\AppData\Roaming\Microsoft\jdownloader.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Roaming\Microsoft\jdownloader.exeC:\Users\Admin\AppData\Roaming\Microsoft\jdownloader.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\Microsoft\jdownloader.exeC:\Users\Admin\AppData\Roaming\Microsoft\jdownloader.exe6⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1284
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5df17a4f4dcf052ffa5eaeed0c0fc7953
SHA15e8ee98d568490dbc1e0ada71c9e506b9c7cd829
SHA2562bd314af81ffdcd875ba791d1eeb57b4c62d32dcf58ba833af121f50642a4ead
SHA512b420c03b47905cb56f074538a2470c27862a46a6e184d8851594f143595dcce7490d1c870f8676bb1047302fc92ab8165544cf14e6e25063146bc1db0e5b8366