Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe
-
Size
208KB
-
MD5
edbb00a88383647cbc9f671f60a5614d
-
SHA1
af25d739d6d841801246dc01026c460081f28963
-
SHA256
3484f0c6ad53d3b3f6584dc2bcfd374e8d0e3ff16b8d31bdd28faeb6b01cc8e0
-
SHA512
f6d3050f7f6e79d6e02e08c2c897f4210a45e2df793a19feb92e917aa25048a1b4296bec86a4cd1073e61fa336dd3d857b9d6a3abec8c59df6e42c695709f513
-
SSDEEP
3072:YVHgCc4xGvbwcU9KQ2BBAHmaPxxVolb5EE:FCc4xGxWKQ2Bonxq
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1684 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1288 edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe 1288 edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\3bb9afa4\jusched.exe edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe File created C:\Program Files (x86)\3bb9afa4\3bb9afa4 edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Update23.job edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1684 1288 edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe 30 PID 1288 wrote to memory of 1684 1288 edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe 30 PID 1288 wrote to memory of 1684 1288 edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe 30 PID 1288 wrote to memory of 1684 1288 edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edbb00a88383647cbc9f671f60a5614d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\3bb9afa4\jusched.exe"C:\Program Files (x86)\3bb9afa4\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5134c1d489094d6d3399f65b0e9aebc1f
SHA1612a57fbe6ed3ab9c15b39451171d813314a28d5
SHA25654f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781
SHA512b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed
-
Filesize
208KB
MD5f48b109225e6b76f62c022384ae05ae2
SHA1fbb7ba7f0b32b59419aa3d35699e299b6af8cd0f
SHA256f82a1d856304e6aa496e2e7f73a8c03412486811a98b35f02d487f9f1c4bf5f9
SHA512a5db90b2359e0d9a6d9d75b4dab06ee2fb5abebc1f0c2a4ba13bbc21a670b9e20ae1891e110daf7635bcaac0d98de30337b9e3459d49011640282303d40ce402