Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe
-
Size
151KB
-
MD5
eefdb31c997e326f76cc23a1a39c12d2
-
SHA1
9919a241cd29fc8af20d793274c3ec1867dd3039
-
SHA256
4d2aa1a180cf16f979ef8d4882337e23c581ff566f5856f698c2f1fab3fba83e
-
SHA512
e513152860dc43225adca7cc56d0a11baa8aac605408410d77dc2c42d8dc5fbf29f1787e369e423c673d02d3ed8215793f23aa6ea9135271cfe9046b20549a3b
-
SSDEEP
3072:xd8MWHPTtj2iRqpbhJEs11fzIAcC/Bu76hLrj:xd8MWHPTtj2iSn711rXq2P
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\R: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\Q: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\L: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\K: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\G: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\Y: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\T: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\P: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\I: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\H: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\V: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\X: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\S: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\O: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\N: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\M: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\E: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\Z: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\J: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened (read-only) \??\W: eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened for modification C:\autorun.inf eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\GROOVE.EXE eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log winword.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winword.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2144 winword.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2232 eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 winword.exe 2144 winword.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2144 2232 eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2144 2232 eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2144 2232 eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2144 2232 eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe 31 PID 2144 wrote to memory of 2612 2144 winword.exe 33 PID 2144 wrote to memory of 2612 2144 winword.exe 33 PID 2144 wrote to memory of 2612 2144 winword.exe 33 PID 2144 wrote to memory of 2612 2144 winword.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eefdb31c997e326f76cc23a1a39c12d2_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"C:\Program Files (x86)\Microsoft Office\Office14\winword.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5640cdd43b4589bf166697c31014e49e3
SHA1af347cd311aefa7aac70fba49c0c21b3ed269d96
SHA2561dcef374752c1bb8ef030dfacf3d8d6790b039b3da2b84bf6bf797513a0d9894
SHA512684c4a68e30471d30ea86ad173586be43991f6af27a33b9ae9511599a7b86ac2a71cc48f26c038c791891ebcdd1f113785e2f66074e97d287030f9708df51ed1
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
151KB
MD5e62512ad79e33ce293423f7976424f3e
SHA1acea7f476ba0423b302f16f892e0e58dbae1fd35
SHA25673875234af652759818acd097c8f7cfc63dd66951de420cd7968e4f39366e149
SHA512d8704cfae5c8daf5e1bffc53dcc59d2246a40e07b385566146236169fd0ed9a4790df7f3adc6dea40bab534ac3804f1e17dfbe5f41047c2921faa1d1a24fe10f
-
Filesize
152KB
MD527a9c4ee2faafc02ec829e4dff9712cb
SHA14ebfd40ae557974624407401474aa6b92c9dbe0c
SHA256ff19fe5d230014da1a9c78a758aa3b7f7e9b738926a607ef2329faed719d705d
SHA512dfd104fd3d7edbce1ec3dfc697efd9545c54ca37b69bfc672cc8127036e636c68590dab58c0176687f6c60459882aec33e676d1ed08036023a1e3e91f639767e