Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 06:55
Behavioral task
behavioral1
Sample
dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
dde6b4d3aad336665f3b531c5cc940b9
-
SHA1
111f4002cb2caf6773f80d60453b820579185db6
-
SHA256
b7c1be4f147752472c3a6baa3dceae26290ed2e13680627126b5b69bde77e690
-
SHA512
c9436db506d7d2ad836234962ea603fa8ac82a173dcc67789efb6f5e7eb1a7369bec3d871015d808ff519fdeb272df6373e9b01511d1647098c5a78ef192d1db
-
SSDEEP
6144:eu7pZ0pfwcgLEhqh0riJUkIdz9fi7NxUJ4OCzoS:3psKE8hJn4qtzoS
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2252 Run32.exe 2708 Run32.exe 2816 cunt.exe 1912 cunt.exe -
Loads dropped DLL 8 IoCs
pid Process 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 2252 Run32.exe 2708 Run32.exe 2708 Run32.exe -
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral1/files/0x0008000000016276-22.dat upx behavioral1/memory/2380-38-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral1/memory/2252-50-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral1/memory/2816-61-0x0000000000400000-0x0000000000509000-memory.dmp upx behavioral1/memory/2708-59-0x0000000002120000-0x0000000002229000-memory.dmp upx behavioral1/memory/2816-72-0x0000000000400000-0x0000000000509000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Run32.dll = "C:\\Users\\Admin\\AppData\\Roaming\\Run32.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\cunt.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\cunt.exe\"" cunt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cunt.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\cunt.exe\"" cunt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2252 set thread context of 2708 2252 Run32.exe 35 PID 2816 set thread context of 1912 2816 cunt.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Run32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Run32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cunt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2708 Run32.exe 2708 Run32.exe 1912 cunt.exe 1912 cunt.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 2252 Run32.exe 2816 cunt.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2440 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2440 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2440 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2440 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 31 PID 2440 wrote to memory of 2204 2440 cmd.exe 33 PID 2440 wrote to memory of 2204 2440 cmd.exe 33 PID 2440 wrote to memory of 2204 2440 cmd.exe 33 PID 2440 wrote to memory of 2204 2440 cmd.exe 33 PID 2380 wrote to memory of 2252 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 34 PID 2380 wrote to memory of 2252 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 34 PID 2380 wrote to memory of 2252 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 34 PID 2380 wrote to memory of 2252 2380 dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe 34 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2252 wrote to memory of 2708 2252 Run32.exe 35 PID 2708 wrote to memory of 1160 2708 Run32.exe 20 PID 2708 wrote to memory of 2816 2708 Run32.exe 36 PID 2708 wrote to memory of 2816 2708 Run32.exe 36 PID 2708 wrote to memory of 2816 2708 Run32.exe 36 PID 2708 wrote to memory of 2816 2708 Run32.exe 36 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 2816 wrote to memory of 1912 2816 cunt.exe 37 PID 1912 wrote to memory of 1160 1912 cunt.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dde6b4d3aad336665f3b531c5cc940b9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pnOrz.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run32.dll" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Run32.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
C:\Users\Admin\AppData\Roaming\Run32.exe"C:\Users\Admin\AppData\Roaming\Run32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\Run32.exeC:\Users\Admin\AppData\Roaming\Run32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\cunt.exe"C:\Users\Admin\AppData\Roaming\cunt.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\cunt.exeC:\Users\Admin\AppData\Roaming\cunt.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD552dd81881fa3a9e2f376bb73bde15b00
SHA19440375fb9fb0368f982754f76e2efd295b25463
SHA256a937077f0e234149b1e15e413d33c9f55ad3f427be87d806719c96b3b95209a2
SHA51280c8f687f6c58bd0549c29e7df64fa5585fa877ac5505a72772ba0cae44b01397bd4e2c217681f8662ea5aff69f115c3fbc306c6b1c3e33d9089aa4f887d2fb0
-
Filesize
1.0MB
MD5dde6b4d3aad336665f3b531c5cc940b9
SHA1111f4002cb2caf6773f80d60453b820579185db6
SHA256b7c1be4f147752472c3a6baa3dceae26290ed2e13680627126b5b69bde77e690
SHA512c9436db506d7d2ad836234962ea603fa8ac82a173dcc67789efb6f5e7eb1a7369bec3d871015d808ff519fdeb272df6373e9b01511d1647098c5a78ef192d1db