Overview
overview
7Static
static
703accf5514...18.exe
windows7-x64
703accf5514...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3DriverGenius.exe
windows7-x64
3DriverGenius.exe
windows10-2004-x64
3XceedZip.dll
windows7-x64
3XceedZip.dll
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 23:54
Behavioral task
behavioral1
Sample
03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DriverGenius.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
DriverGenius.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
XceedZip.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
XceedZip.dll
Resource
win10v2004-20240802-en
General
-
Target
03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe
-
Size
989KB
-
MD5
03accf5514141164e8a50f4febd5ab32
-
SHA1
cc9b772b0f552c8cfe6e469200d3bb26a90a540c
-
SHA256
a5b800ea2f006739034f26dd01e895697bbe4fd7482038ee61c6fc73e2659228
-
SHA512
e6a53df6c77ce928a0d8d5594c0c317474ef6df80b1c63299fb38ee393b4518a7a8de76f89ddd9e822c34954bc5ce41d4e50d0974bf4b33b08cd9d5f4dc88fdb
-
SSDEEP
24576:jonZJkWdUKsnmvfbWrCSTT7r3WN5b8yZBaWIFE2Ws:sJLLOmXbWrCSnn45bFU
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00070000000234cb-8.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4940 DriverGenius.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Driver Genius Professional Edition\XceedZip.dll 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File created C:\Program Files (x86)\Driver Genius Professional Edition\setting.reg 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Driver Genius Professional Edition\DailyTip.dat 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Driver Genius Professional Edition\Register.key 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File created C:\Program Files (x86)\Driver Genius Professional Edition\XceedZip.dll 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Driver Genius Professional Edition\DriverGenius.exe 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Driver Genius Professional Edition\setting.reg 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File created C:\Program Files (x86)\Driver Genius Professional Edition\DailyTip.dat 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File created C:\Program Files (x86)\Driver Genius Professional Edition\DriverGenius.exe 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe File created C:\Program Files (x86)\Driver Genius Professional Edition\Register.key 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DriverGenius.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2664 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4940 DriverGenius.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 232 wrote to memory of 2664 232 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe 82 PID 232 wrote to memory of 2664 232 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe 82 PID 232 wrote to memory of 2664 232 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe 82 PID 232 wrote to memory of 4940 232 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe 83 PID 232 wrote to memory of 4940 232 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe 83 PID 232 wrote to memory of 4940 232 03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03accf5514141164e8a50f4febd5ab32_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\regedit.exeregedit /s setting.reg2⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2664
-
-
C:\Program Files (x86)\Driver Genius Professional Edition\DriverGenius.exeDriverGenius.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
770KB
MD5740e300006a510f82add5f49c1a12ab5
SHA15ed94f2271d510f5861f766770129ca630ba4f2f
SHA256b9195eb8127a72e98d86dfc898faba323f225beef3e5803602198cd0410e4119
SHA51243a3e061b0313ec3329ffcb22dc6de839acadafae55b2f84d171d3d3ac7a9e9739da702755b62f753ec3259d6d2b18a4d8d982253cc41d12546089a5d202e1f6
-
Filesize
1KB
MD5a491df8363dd2439588556a49e3d563a
SHA1315bcb4abf65b50312b4b604c740bae0bac0b4db
SHA256482dab0a6c25a0f79dfc95b520cad89d036db95a73caf1bb39c97bdbb9cb17fa
SHA512e53ed96ef88a8edac7f7eddd7ded9d2b81c824f7863059f28dca55d95755100775ac28928e3013f09d5cbf73fb6056edd239b3e2b3ab71c6481de8add7d53f16