Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe
-
Size
219KB
-
MD5
07e9516a2597243e200c0553201b2eae
-
SHA1
8fe3f50a429f86609901ced70b010a0922c75135
-
SHA256
12713502769c1cce9066f51d07785fb6913fde025de0c0e3d1ff811533e94607
-
SHA512
88f284296c7002d2ffe534189ae0a291d5131052ce43bccabdd0b8f0e8f1db379efd2c5a20e4159aa7e1b64e02e9a9780dcafb480a316776ea68b442763502f6
-
SSDEEP
6144:AcWMJJhqryYP/XaabDSViEtnCGmmoohGrCQe+ACC:AczJJhqrVP/TUiEkGmbrPe+ACC
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winupdate.bat cmd.exe File opened for modification C:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winupdate.bat cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
windowsupdate.exewinupdate.exepid process 884 windowsupdate.exe 2816 winupdate.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exewindowsupdate.exepid process 2936 cmd.exe 884 windowsupdate.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
07e9516a2597243e200c0553201b2eae_JaffaCakes118.execmd.exemspaint.exewindowsupdate.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspaint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsupdate.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
mspaint.exepid process 2708 mspaint.exe 2708 mspaint.exe 2708 mspaint.exe 2708 mspaint.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
07e9516a2597243e200c0553201b2eae_JaffaCakes118.execmd.exewindowsupdate.exedescription pid process target process PID 2656 wrote to memory of 2936 2656 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe cmd.exe PID 2656 wrote to memory of 2936 2656 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe cmd.exe PID 2656 wrote to memory of 2936 2656 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe cmd.exe PID 2656 wrote to memory of 2936 2656 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe cmd.exe PID 2656 wrote to memory of 2936 2656 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe cmd.exe PID 2656 wrote to memory of 2936 2656 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe cmd.exe PID 2656 wrote to memory of 2936 2656 07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe cmd.exe PID 2936 wrote to memory of 2708 2936 cmd.exe mspaint.exe PID 2936 wrote to memory of 2708 2936 cmd.exe mspaint.exe PID 2936 wrote to memory of 2708 2936 cmd.exe mspaint.exe PID 2936 wrote to memory of 2708 2936 cmd.exe mspaint.exe PID 2936 wrote to memory of 2708 2936 cmd.exe mspaint.exe PID 2936 wrote to memory of 2708 2936 cmd.exe mspaint.exe PID 2936 wrote to memory of 2708 2936 cmd.exe mspaint.exe PID 2936 wrote to memory of 884 2936 cmd.exe windowsupdate.exe PID 2936 wrote to memory of 884 2936 cmd.exe windowsupdate.exe PID 2936 wrote to memory of 884 2936 cmd.exe windowsupdate.exe PID 2936 wrote to memory of 884 2936 cmd.exe windowsupdate.exe PID 2936 wrote to memory of 884 2936 cmd.exe windowsupdate.exe PID 2936 wrote to memory of 884 2936 cmd.exe windowsupdate.exe PID 2936 wrote to memory of 884 2936 cmd.exe windowsupdate.exe PID 884 wrote to memory of 2816 884 windowsupdate.exe winupdate.exe PID 884 wrote to memory of 2816 884 windowsupdate.exe winupdate.exe PID 884 wrote to memory of 2816 884 windowsupdate.exe winupdate.exe PID 884 wrote to memory of 2816 884 windowsupdate.exe winupdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07e9516a2597243e200c0553201b2eae_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\copy.bat" "2⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\mspaint.exemspaint "C:\Users\Admin\AppData\Roaming\sania.jpg"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\windowsupdate.exe"C:\Users\Admin\AppData\Roaming\windowsupdate.exe" /NOCONSOLE /SILENT /D="C:\Users\Admin\AppData\Roaming" "C:\Users\Admin\AppData\Roaming\winupdate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\winupdate.exeC:\Users\Admin\AppData\Roaming\winupdate.exe4⤵
- Executes dropped EXE
PID:2816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD51c4846dfa06a9f282fda895db02f66a9
SHA16848f266f091d242fb44e91034f8f65e27f68776
SHA256197229091168028700dd500c19a03914cf11fb56cec18e2eac8ee5a307cc46f4
SHA512f383596189240c6d96f256798e15f78d0bc25abdeef5326d4655933edafb88c3c7fad4cccd1ec8952ec155eb9e98160a4cf1245d0ca4a9528b2385904873b5bc
-
Filesize
34KB
MD57eb2e492c5cd0a0472996e607cc697bc
SHA13a9b0002fdcd962c2fdb8aebb684f040655d7566
SHA25670065deb283322525c0f165bae05a3c8b7e55caf636057afbc0ea01a1d283495
SHA512fe7e66a4d880ed8998a775aeec5fe31e1733d2459d19bff2214046159a13170eddcf1ae58115a589bb41e7cbaaf80b5a4c5d7a50424eb05ecde6a52b03925a7e
-
Filesize
104KB
MD52614f5513a98857b82a9a5fab3d35834
SHA1dce751fd7946a5ca2da4773df9e8c4ca1ea120a0
SHA2567a07f4eb5cffd63504629414ece45527198948e2acdf3466b2c4ff3b113dec42
SHA512c148f96355c6e2f4f86f5ea6b7b2eedc226c84ae6856d8f8661f5eb4f81a407eb402505a5ea050fa125520fce3d63157dfe5a436d8f4fde2b65b37e5217550f7
-
Filesize
102B
MD5ed38a8802b66da594534c7f208d3588b
SHA1175115334eb8567a948f41220ca6c0dbbfc9bbc5
SHA2565f2b2e6b4415989ab5325e4b1ccb3c50929acfe795dbc07196c14e2bed0f3151
SHA512025a0232099b27373829ee08021ef0f14d0af7b5d60e8b3c1eb20fc06db13376a7b9db066c41c44541d7716d2a7ee88b0ce0d12be4cd5263c4697062676d601c
-
Filesize
11KB
MD5beacb8ce99ec4221bb9d87e1d08f40b0
SHA1db69e2f7038ff160cc507e4abd23ac07e083f83f
SHA2565254d8b8bbc0e6a4c594ae2644c1e220b3dd314401b64e7c7ccb32379d73c7b2
SHA5121766d1780c556540f2574fc5552705fad126627bd7dd3b4d7c0d11486d8ce88d22727a52d93e87e2bdd2d67298a06d89166118f56dcde6b61283892581a73e35