Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe
-
Size
214KB
-
MD5
fdf5cf61ae16a8491d38de55ecc19fc0
-
SHA1
e3388050515d51b41616297fc5bb213f0658ccc5
-
SHA256
fdbb53bea57607a065cca4eeb7b55f8678e5b21600497492ec67d0fc7926d985
-
SHA512
38f2c18f696be69f08331e4aa507108528be4d0232586e919910c3cc80654ba926c1f24903258764cb1b6f6fdcc5d661245e9482fce043139e36a8481a10749d
-
SSDEEP
3072:6/uSnUuEgbB3cTlji/6/nZ0f/2GS1c5mk16bzpqZsK8Lm6Zp:CbB3j/6y3xJ8k1kzmsK8L9Zp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2480 HelpMe.exe 2676 shell.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe 2168 fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 48 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\h:\autorun.inf HelpMe.exe File opened for modification \??\m:\autorun.inf HelpMe.exe File created \??\r:\autorun.inf HelpMe.exe File created \??\s:\autorun.inf HelpMe.exe File opened for modification \??\w:\autorun.inf HelpMe.exe File opened for modification \??\y:\autorun.inf HelpMe.exe File opened for modification \??\g:\autorun.inf HelpMe.exe File opened for modification \??\i:\autorun.inf HelpMe.exe File opened for modification \??\j:\autorun.inf HelpMe.exe File opened for modification \??\o:\autorun.inf HelpMe.exe File created \??\p:\autorun.inf HelpMe.exe File created \??\t:\autorun.inf HelpMe.exe File opened for modification \??\v:\autorun.inf HelpMe.exe File created \??\w:\autorun.inf HelpMe.exe File opened for modification \??\e:\autorun.inf HelpMe.exe File created \??\e:\autorun.inf HelpMe.exe File opened for modification \??\f:\autorun.inf HelpMe.exe File created \??\l:\autorun.inf HelpMe.exe File opened for modification \??\l:\autorun.inf HelpMe.exe File opened for modification \??\c:\autorun.inf HelpMe.exe File opened for modification \??\h:\autorun.inf HelpMe.exe File created \??\f:\autorun.inf HelpMe.exe File created \??\g:\autorun.inf HelpMe.exe File opened for modification \??\x:\autorun.inf HelpMe.exe File created \??\z:\autorun.inf HelpMe.exe File created \??\c:\autorun.inf HelpMe.exe File created \??\i:\autorun.inf HelpMe.exe File opened for modification \??\k:\autorun.inf HelpMe.exe File created \??\m:\autorun.inf HelpMe.exe File opened for modification \??\n:\autorun.inf HelpMe.exe File opened for modification \??\q:\autorun.inf HelpMe.exe File created \??\v:\autorun.inf HelpMe.exe File created \??\d:\autorun.inf HelpMe.exe File created \??\k:\autorun.inf HelpMe.exe File opened for modification \??\r:\autorun.inf HelpMe.exe File opened for modification \??\t:\autorun.inf HelpMe.exe File opened for modification \??\u:\autorun.inf HelpMe.exe File created \??\y:\autorun.inf HelpMe.exe File opened for modification \??\z:\autorun.inf HelpMe.exe File created \??\j:\autorun.inf HelpMe.exe File created \??\n:\autorun.inf HelpMe.exe File created \??\o:\autorun.inf HelpMe.exe File opened for modification \??\p:\autorun.inf HelpMe.exe File created \??\q:\autorun.inf HelpMe.exe File opened for modification \??\s:\autorun.inf HelpMe.exe File created \??\u:\autorun.inf HelpMe.exe File created \??\x:\autorun.inf HelpMe.exe File opened for modification \??\d:\autorun.inf HelpMe.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\HelpMe.exe HelpMe.exe -
resource yara_rule behavioral1/files/0x0008000000018b4d-6.dat upx behavioral1/memory/2168-8-0x0000000000270000-0x000000000028F000-memory.dmp upx behavioral1/memory/2480-40-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HelpMe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe 2480 HelpMe.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2480 2168 fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe 29 PID 2168 wrote to memory of 2480 2168 fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe 29 PID 2168 wrote to memory of 2480 2168 fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe 29 PID 2168 wrote to memory of 2480 2168 fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe 29 PID 2480 wrote to memory of 2676 2480 HelpMe.exe 31 PID 2480 wrote to memory of 2676 2480 HelpMe.exe 31 PID 2480 wrote to memory of 2676 2480 HelpMe.exe 31 PID 2480 wrote to memory of 2676 2480 HelpMe.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdf5cf61ae16a8491d38de55ecc19fc0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\shell.exec:\shell.exe3⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD51e1af29558a59327acb8f5e4fad07d5d
SHA1e9000fb7730178b6639806b62ca7c4ab84358d1c
SHA256c162411b2781c6758d849eee1723ae2fa48afebd596bbdf9e3880ce941b441e8
SHA5124cf16258e353cac843ab840ffaaa6b28df08d022a1e862fb8369e55a1dda5975c7e39d5cc70901da3f478ca3a436e969fbcfd78f5eb8241bcc2da4ff37ad67cc
-
Filesize
8KB
MD549e4ae66e3d8431281d63042eb2ba526
SHA152332e5af72945f86864c3035337288164d83c4d
SHA25699741cb43cd7404aa00e59e0bad91c2da27d52fb91880a92604e075b71e39985
SHA5125dc759bbf947de53cac80741725f1be2c127d6c9edcf0ad928f15c2b98417898550af23034447824bacb96ceb4fe672cebf0cfe5e70ef10371ddae2bf93f021e
-
Filesize
90KB
MD512412614862087bf9a7920eb7b0ba4bb
SHA1beadbeb477126ff284eb3b5b2d5d9e2e61e20eda
SHA2561a22cec2c0eb5b0ee14a499ecc0862f44e0b2fa9f3d9caddd1f51344c6310525
SHA51235828cb0731f1277063a2dfa663a12807c301c0fef6aa3c0c6b61b71800c4f71e6356640f1adcebce842965d5139181450d7eddc19d6f284fe7c1bd4e4b560d5