Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe
-
Size
126KB
-
MD5
ea93b62750fba02da95feaa15fb6d6f4
-
SHA1
3ce2c0239c71e150c1d0ee24327f8126f50d2067
-
SHA256
fc1b39ccf9ac591623bb92757fbfb3e2674441f449ffb8c4a8d95297aa9bf786
-
SHA512
0e06b0208185e1c2c6f1566d463d5c3110f06291893e660ffb7bfdd17b9737a23fae2ba328062b267ca137a7cfcf0a0c055a8323cff9d919e2f100a8a47e1c97
-
SSDEEP
3072:ucaJvW8koHjmX+1+0cxxsWEsJ0ifXcIp08MoeJuotSyhi:ucaJuqVxYT52MZMDS7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe -
Drops file in System32 directory 27 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\15 year old webcam.mpg.pif ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\pamela anderson naked.mpg.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Kama Sutra Tetris.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\teen tied up and raped.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\anastasia nude.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Lolita preteen sex.mpeg.pif ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute girl giving head.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Digimon.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AIM Account Stealer.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Want to see a massive horse cock in a tight little teen's pussy.mpg.pif ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\virtua girl - adriana.pif ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\invisible IP.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Hotmail Hacker.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot girl on the beach sucking cock and fucking guy.mpg.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\kill osama bin laden game.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Norton antivirus 2002.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\yahoo cracker.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\icqcracker.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\preteen sucking huge cock illegal.mpg.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\OfficeXP Keygen.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Free Porn.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\15 year old on beach.mpg.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\aol password cracker.exe ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\illegal preteen porn anal fisting.mpg.pif ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea93b62750fba02da95feaa15fb6d6f4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5d76392cf72650cf075b88460b893e828
SHA18667e691ea9c0035a8a472abd08ccad3c8c90620
SHA256201737bf82080aab017ed412eff2308d5ee6b0cba0423a3fc783c270127fc355
SHA512dcdc81aba481a269c2577ce75c7f85f2d5843805f9c2c7e59e7e05fafe63f955f9cf9792846e716c46a555c14c337a8234ece9156f76ea5e41eb1613c1302f12