Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
-
Size
158KB
-
MD5
f6a3194ea41f21648fb744b37777e9d0
-
SHA1
2764f1db27f10996cb2770e480929ddc005b4762
-
SHA256
8c9315cf78b196805257980088c01af9b172336588722e11faefd7abefd3479b
-
SHA512
91e498f3acfa5be7770465df1ded674484969946b70c828c0a2bb3c6389eb75bde4b7a8cf8be2de52a88530104404a172f70dfb4542d88f98e98f1275f330504
-
SSDEEP
3072:jmVW8iTX/3RfldjjXq1+0cxxsWEL02fXcIp08Moe2lR3aH:aM7jJlRexYTHYZMEM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\redhead in red lingerie ready to fuck.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\plump brunette using her finger.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\an asian bush getting a cum bath.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\15 year old on beach.mpg.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot slut with a big dildo.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babe doing boyfriend and his buddy.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - shower scene.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\amateur orgy at a swinger party.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hot blonde fucking and sucking cum.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Another bang bus victim forced rape sex cum.mpg.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two teenie boppers learning to eat pussy.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute blonde cheerleader dancing.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\drunk babes sharing a dick.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sexy beautiful soon to be pornstar.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\jenna jameson - xxx nurse scene.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\illgal incest preteen porn cum.mpg.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\luscious babe with serious ass and firm titts.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\head rooster pimping hot little tender ass chickens.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\16 year old webcam.mpg.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\msncracker.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\fine babe spreading extremely hot ass and furball.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute teen with her hole spread wide open.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\stud fucking his blonde french maid.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\both holes fucked by a massive fucking machin.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\hotmailhacker.exe f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\aunt and nephew doing the nasty.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\chubby girl bukkake gang banged sucking cock.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\movie of mom who whip hot ass on daughter's big cock lover.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\kitty-cat with horny beaver that needs licking.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\candy stripper getting down on sick mans cock.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\dude getting burned out trying to fuck 2 hot babes.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\redhead getting a group facial at a wild party.mpg.pif f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6a3194ea41f21648fb744b37777e9d0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5cbf20e2b1a8dee7ad872d66c0339e139
SHA1f84cec4c8c6a1f8c848bb1df5ebd3f4077f112c3
SHA256737f86cf7b06d07d4019fedd786ae14126e188d841e4cf642e1a1af1f09020ec
SHA5121d24c7a7c797c58d295df7e6c3cccb553098e6aa0051034a5e714e39ee7357d98eab1b0bf075da26c3e90ac65da2e2b91168b5fb2b96cad32a196683212d5f16