Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe
-
Size
193KB
-
MD5
fa60d219bdf4c08aeea2bb3b792bde57
-
SHA1
d54bd827180f232211470ab7f6607e0b94e7c9b3
-
SHA256
b4be31c66f9425ebe212509d94052245d83531aa653c9a30bb8a615e7de94be6
-
SHA512
34ce8fb876cb8ad19459dab4748d9acdb0ba1ebf625da51f58aad57ad1ce812f39bfc8be93a07b04f4d68bc61412bbb79c7b588972c168a7e18bbbf5034ad371
-
SSDEEP
3072:DrkCYyGvGJwVJmOv3pdmlQnv1AhNTTRQqcED2BYlRtVp0IuogTw1:Da1GmmI3pdmGyhRZHDZntVy9ob
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\acpidisk.sys 0.exe File opened for modification C:\Windows\SysWOW64\drivers\acpidisk.sys 0.exe -
Executes dropped EXE 3 IoCs
pid Process 1500 my_70133.exe 2372 dodolook005.exe 2884 0.exe -
Loads dropped DLL 22 IoCs
pid Process 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 2372 dodolook005.exe 2372 dodolook005.exe 2372 dodolook005.exe 2372 dodolook005.exe 2372 dodolook005.exe 2372 dodolook005.exe 2884 0.exe 2884 0.exe 2884 0.exe 2884 0.exe 2884 0.exe 2884 0.exe 2372 dodolook005.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mscpx32r.det 0.exe File created C:\Windows\SysWOW64\mscpx32r.det 0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dodolook005.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language my_70133.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1500 my_70133.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1500 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 30 PID 1252 wrote to memory of 1500 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 30 PID 1252 wrote to memory of 1500 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 30 PID 1252 wrote to memory of 1500 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2372 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2372 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2372 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2372 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2372 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2372 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2372 1252 fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2884 2372 dodolook005.exe 32 PID 2372 wrote to memory of 2884 2372 dodolook005.exe 32 PID 2372 wrote to memory of 2884 2372 dodolook005.exe 32 PID 2372 wrote to memory of 2884 2372 dodolook005.exe 32 PID 2372 wrote to memory of 2884 2372 dodolook005.exe 32 PID 2372 wrote to memory of 2884 2372 dodolook005.exe 32 PID 2372 wrote to memory of 2884 2372 dodolook005.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa60d219bdf4c08aeea2bb3b792bde57_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\my_70133.exe"C:\Users\Admin\AppData\Local\Temp\my_70133.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\Users\Admin\AppData\Local\Temp\dodolook005.exe"C:\Users\Admin\AppData\Local\Temp\dodolook005.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\0.exe"C:\Users\Admin\AppData\Local\Temp\0.exe" 70053⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f1e3c267f9600c60cfdd9252fa38bd31
SHA1ebdde9403690c9f477a2288d8f633b22de1c6290
SHA25658a830d0b2c934b5eeb1512208a22f8fd4b7b5199b510bc45c116fa1bb8a5589
SHA512e8c0308455b36487800184dbe781ca1817df909123a65e57bb677a0f38d116873442bf3be48f4b26f12af8e7c8489881f379e77b04d1e2c03f9fa0b15f56a277
-
Filesize
202KB
MD570d70fba304dd09707e581d8ec88086c
SHA1f3754d718cb19c6917737eea826a88ffae984e54
SHA256146d377fb0bbd5c2a255f0d9f615fcb4e73d2be54c6d8a8bd1c8252f429a078c
SHA512d8f39fe61aa610d909ade9792dd37e28c198b826543991db90f25d8c1dd1053c75c7036e515c9835257fc3354eb91171a06a3cf51892c83d9e9d7a8af67f8b5f
-
Filesize
170KB
MD5fbe44ba6197b35e1682024835e7b814a
SHA1ae7208aaf711ff3b12d9df7306f53500dffa8a5b
SHA25648630b9d0af59b448b8ac38b99c0c9edb0561a7b98aa6eb0a5c0a9c89e757910
SHA5122b5c66394c781d0978decd68180064a124ad203a45002d5356f440ec8e54719652a1e55757afc1547a505f45b548c2ae601b6cc15ee6ab99db267e6da65bb3de
-
Filesize
68KB
MD58e38b257b4ad50f610298d3201053722
SHA13144d063f931b72704a9c47b13c1b6a29d743ab5
SHA25648d29624e8446e3e23ce0082799384b5c2193eda4795ee355e8fcb3b031bd279
SHA512d6bcce6f12d59d82c19b131685454d20735b1640f40ea94eeb0229086dd8cff53ac48e85b84de938e1418af581db3af6e5b5b5158f1237f74bd57b6b69e257f9
-
Filesize
20KB
MD5ed90cf0b9370e69a9752c9468af76fd9
SHA17a98c726bac5cedee5a7336151676c35675dafda
SHA2564a66371f424d6ceff38f632845c8b4876d22f6a628d9dd86e5f31ee7ed59f2a8
SHA512209e1d998a7db1f1b8bf62f948614926845a8ec1e0235b476c1f3e238e486bfe56ba89a2dd751994456514fd34bb83502a4eeab6a8aa1711a17d7929e06ac1e6
-
Filesize
9KB
MD5afd989ef7eec6bf952bedfce541fe236
SHA15654b71c5b1089c2cec6381d8da5bd14a14e1a37
SHA2565e97602008ba004c72d58f71e77ffe0a0ea01103867eb12a9ec0f28e72f440d8
SHA512f4e3d88477d39218667dd482a08904b2b69435db7d1fdd492380544aff83895d393a288c329da69074b69c68f51db45f694dfea81fc12fa2042ed43b3d06440c
-
Filesize
10KB
MD561151aff8c92ca17b3fab51ce1ca7156
SHA168a02015863c2877a20c27da45704028dbaa7eff
SHA256af15ef6479e5ac5752d139d1c477ec02def9077df897dadc8297005b3fc4999d
SHA5124f5c943b7058910dc635bdcfadfea1d369c3d645239d1a52b030c21f43aac8e76549e52fd28e38ba5341d32aefe3c090dd8377d9e105ad77f71ab8870d8e326e