Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe
-
Size
336KB
-
MD5
0013210c0c72e1986c321e41190b187c
-
SHA1
103fec1a835e5481d17affa4cba6b0728e7be778
-
SHA256
c7a08592bdf69cac3585687e7901b3864d46a17c3f3b41638f59d4b62dc2b6e2
-
SHA512
787cdc54b32e7fda314f0c0d8a9c149741d85cdc16755b2a196d5fd79d5c5c07157614017be399ebdd569dc9f132829fc3a6800639a98ff1c1aeb7c5eeb5b925
-
SSDEEP
6144:+8U2qy6rRZb7jxGYKSTJDPM83llq9v+evY56asFmZluUbbVizdKRJoE5:gzy6rRxE8UOlwvVvY5homZIUM0Rqe
Malware Config
Signatures
-
Drops file in Drivers directory 10 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\127014_128820_f_640x480.jpg 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe File created C:\Windows\System32\drivers\etc\hоsts 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe File created C:\Windows\System32\drivers\etc\start1.exe 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe File created C:\Windows\System32\drivers\etc\Death.bat start1.exe File opened for modification C:\Windows\System32\drivers\etc\127014_128820_f_640x480.jpg DllHost.exe File created C:\Windows\System32\drivers\etc\__tmp_rar_sfx_access_check_259443921 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe File opened for modification C:\Windows\System32\drivers\etc\127014_128820_f_640x480.jpg 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe File opened for modification C:\Windows\System32\drivers\etc\hоsts 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe File opened for modification C:\Windows\System32\drivers\etc\start1.exe 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\malwox.exe start1.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 start1.exe -
Loads dropped DLL 2 IoCs
pid Process 2252 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe 2252 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2332 start1.exe 1628 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2332 2252 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2332 2252 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2332 2252 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe 31 PID 2252 wrote to memory of 2332 2252 0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2728 2332 start1.exe 33 PID 2332 wrote to memory of 2728 2332 start1.exe 33 PID 2332 wrote to memory of 2728 2332 start1.exe 33 PID 2332 wrote to memory of 2728 2332 start1.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0013210c0c72e1986c321e41190b187c_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\drivers\etc\start1.exe"C:\Windows\system32\drivers\etc\start1.exe"2⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\System32\drivers\etc\Death.bat" "C:\Windows\system32\drivers\etc\start1.exe" "3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5707b441ffca81e2d2d884c27e92f6899
SHA19c847992fa5af864ba8b230fb8c48a7f76acc2d3
SHA256957cfd51a3c7d5dd11af2036e03f760c6151cdc082bb49008adfbf2f7efb1e3b
SHA5121f3b951442d5bf5ac9decce94954103a2ec90741dc447a2a0a2d2ef1608554fdd745e75fdf9814bcaa3c773ea49f0df5537f78558e83f70edc27204ff1e8456c
-
Filesize
38B
MD550a94effec08179504ef46949486ef63
SHA1c36bcfbc6d85d0ae7b5642655985ecc2ab1f9e1d
SHA256149194e913c7900de706a6a48db7695059b91fd63ebc75b373355c7009fb62e2
SHA512095c1914e290377676cfbf07c52fb321d8e51638229810e560447e4db51d2e4dff8bfa870b009029692e12c0b9fe9c1fcf74dde30c3f68297631ff4ea6bbe283
-
Filesize
85KB
MD51fdedba9d6a2a34d161dd82a58bfa957
SHA195b8b6ce5cde603ae1eb7cc1bba7c93046034bce
SHA2565fdc780cb9d0493aa9376ad9bb01dcb0b45b629ad19e661e490190629f470a3d
SHA512fa6dd3e9e834ce1462481aa2d24d9bc7642cf5f163f40aebb7962fa3abd9981e7363fa70b7f0a30815559f64e28fb1442210d555479b7ed8a4b4858ef96d6ec7