Overview
overview
10Static
static
7efc0cbb158...18.exe
windows7-x64
10efc0cbb158...18.exe
windows10-2004-x64
10MetroFramework.dll
windows7-x64
1MetroFramework.dll
windows10-2004-x64
1PS3Lib.dll
windows7-x64
1PS3Lib.dll
windows10-2004-x64
1Tool qM6wr...v1.exe
windows7-x64
7Tool qM6wr...v1.exe
windows10-2004-x64
7llk2.exe
windows7-x64
3llk2.exe
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 12:04
Behavioral task
behavioral1
Sample
efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MetroFramework.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
MetroFramework.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PS3Lib.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PS3Lib.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
Tool qM6wr Private v1.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Tool qM6wr Private v1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
llk2.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
llk2.exe
Resource
win10v2004-20240802-en
General
-
Target
efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe
-
Size
27.6MB
-
MD5
efc0cbb158d388b5d778f876b7bf63ef
-
SHA1
a4a0f15afeb62a68917dfc4f0d974b0d69ccdaaa
-
SHA256
39a33f73741118aa05511c1524ad3da573d7fe94a929cc0660c7719a13d335b0
-
SHA512
14db18dc1ba4a22369090726cbb932c642b7711135aa0279f038b94a09e53041b09482e5a098dfa450813ebb1df0c75fe3615452118398010e5d3a0a1873f432
-
SSDEEP
786432:CvYUcHwRXkRVTSAfvQftVmv9lMPKosqJ4:LPQRXAVfyr+lhHl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3028 Tool qM6wr Private v1.exe 2524 llk2.exe -
Loads dropped DLL 6 IoCs
pid Process 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/3028-27-0x0000000000C90000-0x0000000000D10000-memory.dmp agile_net behavioral1/files/0x000500000001925e-26.dat agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tool qM6wr Private v1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llk2.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe 3028 Tool qM6wr Private v1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 Tool qM6wr Private v1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3028 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 31 PID 2128 wrote to memory of 3028 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 31 PID 2128 wrote to memory of 3028 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 31 PID 2128 wrote to memory of 3028 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2524 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 32 PID 2128 wrote to memory of 2524 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 32 PID 2128 wrote to memory of 2524 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 32 PID 2128 wrote to memory of 2524 2128 efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efc0cbb158d388b5d778f876b7bf63ef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\Tool qM6wr Private v1.exe"C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\Tool qM6wr Private v1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\llk2.exe"C:\Users\Admin\AppData\Local\Temp\Adobe\Updates\llk2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5a3a380676711eac89f67e0043c21b5d6
SHA1587c765dc3ca8d3ea2fa55b9f227cef284287522
SHA256c23cdacb0de78c5c6e8a1dde085cca1bf8261d3b90dac39379a4ac4518d212d1
SHA51298a8a6741fce19d7817e412d0d2fbe772d8fbda527a3f3a56ddce8dec0bcd23c6e0755402ad816af089f50fdd7b33bd8d834f3af6beb85dbff53830b5c130697
-
Filesize
475KB
MD5e2591c9be92cd8f098027885306833aa
SHA199f4bef5ab9d4034cfa5e4d3f2eba83c8038eba4
SHA256f7e015454587c29aff65c82569e629955eb5e52a3a85b4f3677f9f1bc8ab7500
SHA51268c55f8d07d1aa15f8216b2c2c7512cb88d4f92666295a8a84db46b30ac40cb6c4e774650bf41885aff31cc8d49709a05eb5dde2503864354d9c8b0e57f375b6
-
Filesize
28.9MB
MD590ca79ee599a1b09eb943920f3082c20
SHA10cc10d064322b98adcd51dad213c19d4f9098b15
SHA256fa61d4fd3f67c8d1683a5690cf4b7a32aa45bb972fb72a16f8e8795fba9b408b
SHA5122d8a6705416d83636210aa5995c4da698aa236657a3362f3ae0cb5a769a0fd952105d4e5925c7f8996a3bad9e157c128ee3cb8714470f51e72c9d7616122f204
-
Filesize
197KB
MD50e0cfb1529bbf556f107967c4ebae5ee
SHA1c8764f32d617224951c191d8a7624cb6f4a6fc35
SHA2562b838fa014c5dc66cc5f787ec57d6ea89b2700a70d60644e721fcb68d9df4b69
SHA512f4194d0d117674be83e0ba29a9bd49292f744f68ba839697fe98c23d1244839c6e83a8ceadcfd0db43ff997af4879ec692620e7c0ca976516315e456a29bc185