Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 08:25
Behavioral task
behavioral1
Sample
ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe
-
Size
229KB
-
MD5
ed3313f06888b71eb38d083de1e78954
-
SHA1
9037a4de0487f8567329c21163a0a4e4b8027887
-
SHA256
cfe365aa54afbdaeb80058bf75d8e5f830a92e3fb0e725b5a5b91a1d6d95d8ba
-
SHA512
5eaf85bcc0c836e34f41ec82bcf5b39c740a5cc100463577cf1e06420060b1f6c2b78d1c3baa4989b353ad9cd0d6996bacb2748a184106477fa0f9a575d7d3bc
-
SSDEEP
6144:yO793pVUnTDR1CWnRouAtwi7GeMK7DoWsLWu23Usuajv:v3psRRozCi7GeMK7kW6a7uov
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe" ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1288-0-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral1/memory/1288-6-0x0000000000400000-0x000000000048D000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\e: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\n: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\q: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\r: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\a: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\k: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\x: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\z: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\m: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\o: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\s: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\t: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\v: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\p: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\u: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\w: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\g: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\h: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\i: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\j: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\l: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened (read-only) \??\y: ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1288-6-0x0000000000400000-0x000000000048D000-memory.dmp autoit_exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened for modification C:\Windows\ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File created C:\Windows\pc-off.bat ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe File opened for modification C:\Windows\pc-off.bat ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed3313f06888b71eb38d083de1e78954_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1288