Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe
-
Size
152KB
-
MD5
ee28500129ca6f4097e11dc6c93e6c29
-
SHA1
dc803223709221a24221f539d3dbd19407e2ab73
-
SHA256
187330f718eaaeb6da3cac42ae9e01355b072301f2f7b00140999190db5414be
-
SHA512
004ddce69720c71d6d99fd549b2fc6341f44d929f94eb7df60fd8f64b657b13482b63a2762e19eb333ce6dbf20f5301dff6bcedd352e651ecb6fcc9286dc73f6
-
SSDEEP
3072:KoBPNVT25wUV/U1CWTxN13tA/l+w+xFeABa06/JhkEwvnRud/HhJf32cAqOnCDd9:8yUV/0CkWdKWHmrU
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\W: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\O: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\L: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\V: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\T: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\S: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\I: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\Z: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\Y: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\Q: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\P: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\N: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\G: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\U: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\R: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\M: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\K: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\J: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\H: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened (read-only) \??\E: ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened for modification C:\autorun.inf ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\GROOVE.EXE ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log winword.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winword.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2244 winword.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2056 ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2244 winword.exe 2244 winword.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2244 2056 ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2244 2056 ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2244 2056 ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2244 2056 ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2976 2244 winword.exe 33 PID 2244 wrote to memory of 2976 2244 winword.exe 33 PID 2244 wrote to memory of 2976 2244 winword.exe 33 PID 2244 wrote to memory of 2976 2244 winword.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee28500129ca6f4097e11dc6c93e6c29_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5f6d1b922377e16cb5dc7588850a3ecc6
SHA154e2791adc47aee49955089ef41ba834159b22b6
SHA256ab8a3283aeeb82f584002cc8c06e07b98fce0c56ff102c6806b332b1696d7001
SHA5129b1ef68d006787964c97b655c66cf85847482f98d31657d709c1360a47bc516e1e2fd5b07945a111a708bea9793104fdfdb25600f16d2f92a4b7b490d9f0cdfa
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
151KB
MD51501218fc83f400f547427fd7d50893d
SHA1cc1a25d842830ae448a10706876bcf9e2374a745
SHA2566d51203f6e8fd6f031737b8b8e8850dda486de47dbfec2278d0036567908fba2
SHA51203ebb05403f9050027abcb235bb5c53d268236b69c667cb1a9fdfb97aaa2c608daf8a019622fca59d35bfb1d215e13f6ab300252a4c00d02767238287f693998
-
Filesize
151KB
MD5c444b2301485fa5a31f776ed1bb3af6b
SHA10616baa28d4d4543ce9c926dd2d0b009f4b30d8e
SHA2568751cff8335acca94be612f7025bf9484bcd3f84ce2ac08023f217ae539d8548
SHA512fe92203598da1b8b229dfabf64ace78c89a7a0e976d63c3fa5a31e5bb26143a7f7cc82c8e7de7fd28e6a4f5e4948c6af36f806a7b90a039534e99803dded3371