Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe
-
Size
149KB
-
MD5
f683f13bda6095437d4f6d003d74ded9
-
SHA1
3f05aa09473229a7a2d3257c64a758fb73b3cdd5
-
SHA256
4c6052dd3e4abe5d7641f00d190f9d2f9399ebb013c550e67d95b9b833870c85
-
SHA512
70a4e1b400b250b0affadc9e6ab34f4255746c3a75d616917005ad05997867879e217a0d639faf957e22cb27cb45a644609e282e45387e11e3188ddb6cb6ab4c
-
SSDEEP
3072:jmVW8iTX/3RfldjjXq1+0cxxsWEL02fXcIp08MoeJmTe:aM7jJlRexYTHYZMJn
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\babes letting dudes assault their furballs.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hardcored blonde mature.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\fine babe spreading sweet ass and luscious cunt.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\busty ebony girl showing shaved pus.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Choke on cum (sodomy, rape).mpg.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\supermodel nina brosh .mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\an older fat mom spreading wide.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Digimon.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\MSN.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cutie nailed up the ass.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Kama Sutra Tetris.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute teen fingering herself on the sofa.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy hot teens gettin busy in shower.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\petite ebony enjoying her joy toy.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Yahoo mail cracker.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Jenna Jameson Nude Gang Bang Forced Cum Blowjob.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - built for speed.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\some hard sucking and fucking babes.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\honie displaying raw pink ass.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two busty sluts fucked in bathroom.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\wild stud eating and drilling small pussy freek.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\CKY3 - Bam Margera World Industries Alien Workshop.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babe locking lips around her man's rod in backyard.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\teen taking off her panties outdoors.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy star kate hudson nude.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Britney spears nude.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\tiny little virgin showing off her cherry pussy.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\divx pro.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\anastasia nude.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\horny teen waking up with her pink pussy spread.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\fat grannies action.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\gay guy with a screwing machine.mpg.pif f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f683f13bda6095437d4f6d003d74ded9_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD54fb4ec1dad24e11ff808d709dee40ded
SHA18f9e1b69e4dc6b0631f701a1b88125be314f3b9d
SHA2560fbd33ec55080e9fb3c5de213befa4ea08456daacf2689b0049331b4ad5f9673
SHA512c9289d7409b02dc3d968dd271aafed014de772973c076d06cf8e5cefefbcb23bc264301b027fcb604c35b4e905d28b25f7d185505e2bc38bfb3024de38f8ecb0