Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe
-
Size
272KB
-
MD5
eaceaf1277a66d394d672b8ff0d650f0
-
SHA1
1c88050f67814a525456bb3447018739f9887f8a
-
SHA256
5a291b33da4d536a5ba68124086f41c24e100af5be308af716d614fddae02169
-
SHA512
88ddcc70a8604ea3d39df034cb1855ccdeaa7fdebc7a36cca5e37e14a654067785faff0d597d71bfbc4c390259e36a1ce4221c42efa46ada852f15d84d52025d
-
SSDEEP
6144:NVUfpsZaCfrTsNwwYwX+oGi8WQkabsnMuIAFnsk:NVUaZlzTlwYwX+zi0qNIP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 AcroRd32.exe 2684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1996 2280 eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe 31 PID 2280 wrote to memory of 1996 2280 eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe 31 PID 2280 wrote to memory of 1996 2280 eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe 31 PID 1996 wrote to memory of 2684 1996 rundll32.exe 32 PID 1996 wrote to memory of 2684 1996 rundll32.exe 32 PID 1996 wrote to memory of 2684 1996 rundll32.exe 32 PID 1996 wrote to memory of 2684 1996 rundll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaceaf1277a66d394d672b8ff0d650f0_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\Steam Fixer Hebrew v52⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\Steam Fixer Hebrew v5"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54de174e7189ba24e96f88a4ae23efe0a
SHA1d39cbd56c8f3e69345e9111495e5d5d129b0ebe4
SHA2561e5a8a5479fbe42a90cbeef8a5e27e6f342f3600776f9654cce42d2caae3453e
SHA51263e89b6e5b229bc7e37278e67dc4d610e17e5fd2a8b921aebc40eacd4357de64dd4e60576867067b362cf511d4311a997af26b21954e94d27ca5254285c572aa
-
Filesize
272KB
MD5eaceaf1277a66d394d672b8ff0d650f0
SHA11c88050f67814a525456bb3447018739f9887f8a
SHA2565a291b33da4d536a5ba68124086f41c24e100af5be308af716d614fddae02169
SHA51288ddcc70a8604ea3d39df034cb1855ccdeaa7fdebc7a36cca5e37e14a654067785faff0d597d71bfbc4c390259e36a1ce4221c42efa46ada852f15d84d52025d