Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe
-
Size
36KB
-
MD5
dd7767e0f903896b01ef02ad3075ca4f
-
SHA1
c4e902c127def9fdf77ebe5d801cefa2cd5d4a05
-
SHA256
d2d5301af2fde29bd8370a0aadd2beb26263a9c8e19af55009ad7b74a742ad83
-
SHA512
b1d6ec90a77a32126f42f7c33fac96b6d1941f020c5afdde0256eeaa2ccf2b29817b2d4d01c588cd198474915cb29e3f68ad88e45cf5a84ef28dc5619622f892
-
SSDEEP
384:ZvceJQbhx+eQ9bQNpk/yJB1G6WWmCLWONzhiKzXJwPUUewhVUpl5yN1ZaDbk:Obhx+eQhk5dG6WWhRzXJwPpjil5yNOk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" winlogon.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum winlogon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe 2268 winlogon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe 2268 winlogon.exe 2268 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2268 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2268 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2268 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2268 2252 dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd7767e0f903896b01ef02ad3075ca4f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\Admin1\winlogon.exe"C:\Users\Admin\Admin1\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5dd7767e0f903896b01ef02ad3075ca4f
SHA1c4e902c127def9fdf77ebe5d801cefa2cd5d4a05
SHA256d2d5301af2fde29bd8370a0aadd2beb26263a9c8e19af55009ad7b74a742ad83
SHA512b1d6ec90a77a32126f42f7c33fac96b6d1941f020c5afdde0256eeaa2ccf2b29817b2d4d01c588cd198474915cb29e3f68ad88e45cf5a84ef28dc5619622f892