Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 09:35
Static task
static1
Behavioral task
behavioral1
Sample
00a47f3b4f5b329b0a720a0a1ab68eed_JaffaCakes118.jad
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00a47f3b4f5b329b0a720a0a1ab68eed_JaffaCakes118.jad
Resource
win10v2004-20240802-en
General
-
Target
00a47f3b4f5b329b0a720a0a1ab68eed_JaffaCakes118.jad
-
Size
68KB
-
MD5
00a47f3b4f5b329b0a720a0a1ab68eed
-
SHA1
afd73e6936042a9b3312eeabdeeb80b86c693f20
-
SHA256
96c10c70a4ef1f03a2a1e23895b2bda0337c9178132d537fe8f946ec4d9bc06f
-
SHA512
efd6422a4e9637f77c1abe548d3461bcf2786ed9828d05c74e1ec52e644535dd56af00d844c57495d7b59f5e7a7177d6bb2db264755ce5dbcbec1558ce9c1e66
-
SSDEEP
1536:EjUcFC+MEciwy7GtW2insgvrGoZNGtW2insgvrGoZZ:EjUcto67ZsArG8ZsArGy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\.jad rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\jad_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\jad_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2692 2496 cmd.exe 31 PID 2496 wrote to memory of 2692 2496 cmd.exe 31 PID 2496 wrote to memory of 2692 2496 cmd.exe 31 PID 2692 wrote to memory of 2644 2692 rundll32.exe 32 PID 2692 wrote to memory of 2644 2692 rundll32.exe 32 PID 2692 wrote to memory of 2644 2692 rundll32.exe 32 PID 2692 wrote to memory of 2644 2692 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\00a47f3b4f5b329b0a720a0a1ab68eed_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\00a47f3b4f5b329b0a720a0a1ab68eed_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\00a47f3b4f5b329b0a720a0a1ab68eed_JaffaCakes118.jad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD514b9e44ba8152c47acc54296fc2bed6b
SHA1d59383470f2089fd0a75745c3e40b6f4bff7ffed
SHA256ab0b9e639f6f16410709036aeac1ab87bb96f4a44b331e393ebc120667f60550
SHA512dac166534889323c278c50e50637d7ceec485624dfe18eaf14257d081d4bf68e0c4c16080c8f04cee918d4f5ddf5a77e3c1d7d2c1f8e85e59d226b39edb51cc0