Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe
-
Size
12.6MB
-
MD5
04ad42ef9c8ea1b8bfe00ff8ff63825a
-
SHA1
f0bdf033a53e5e7f67b89a10a82fa20d86dafe3e
-
SHA256
a7dd71777604517aa5b1a4660d4f2ff2cf17b717be3c463a69dc6b713ab31032
-
SHA512
62ea2a936404def736f2e36e2a804d1fc4142696321504195b08143effb2b77435f66fb43efa5d3c51e9167f5ad36aef197d01c97f9a45158f5df22501a38ba9
-
SSDEEP
393216:I6Aekcrb4eqrbTOj5fcbVKeKKlqfObtpqWED+rzyEz:ILekcH4eq3TixqMMzqirOO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 autorun.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autorun.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 autorun.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 2740 autorun.exe 2740 autorun.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2740 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2740 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2740 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2740 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2740 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2740 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2740 2100 04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe"C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f1724915ba1d6aae42665ab1d7c35f1b
SHA1a974c0da0608e687946488c5670b3e87812a6e0f
SHA2565e58a87004c840f07af3e8600ce65b8536394288b217eda64025d65bf19e338b
SHA5121a5d954722e9b930e3ad050d5984996f6eeee574e6234ba41296f3c4e5e6218bd15d306c31c9697b5769cd9b95a78d629eec69c9a6776a8fed672a096ddbcb2e
-
Filesize
28KB
MD5ea61af411149fde843c60c0ff356219c
SHA1264b70caf9fcfa96af5abecbb13a4860b5f25b9e
SHA25652633d9e5bec66684a6ade56172d7b11b010c793865ae5e568953f3638b8789c
SHA51285a2fb3113f23067f4547bc874602a996651185247f21747174353622b34b26c7d645705459a24575a913f17431e0d0f9434b4d4dbbda6c53a512bb898f74438
-
Filesize
1KB
MD5a766fe6db2e56800b81241a1aa48f4dc
SHA15cb82d438e793afbc0397bf9b96960b3bf3bb031
SHA2566bc907642c478a2f6e1cbc5cfe771b621a0be9b0e6c82c06375d306283bbaf6d
SHA51230a21924217c0b7439f7b20f8c5917605981c273513811a767f680449c8bab021481d56d35599fe6e6363dcc006a2a2828f6ddc43bac91a755663ba2bd66dcb6
-
Filesize
281KB
MD55bd03bbfc91ed04c93742d6738090caf
SHA1ba78d027b1a71dd2e84ad3cac7b1ad03716ca12e
SHA25659f85254aa032c2fb180aa507b363151f78bbee6f91b066341da11c04a042bde
SHA512ea65f4eb03cb5a7dbd5964d266038a5bf35b9e8f110ff1ab41baf03f8211b46a34fe4dab9cb34d1ce5ae86d4b0070d06042b2ac3701e8c817bf7ce81c0dff0be
-
Filesize
9KB
MD570452368b1b3b59a130a1c349099f689
SHA15907ba88daf4e7cf92f57e3d4196a99e482b107e
SHA25612bca27ceb9e637f22425a38f4350ec82b09cf1bf01cb83af6369ba19ed9a354
SHA51267081b243ad2794cb4da02a5b7db810c7bb5b45a72f67febeb7ea1baf48abbcfdf3db9fcf30862d0dde17e76fd711523d32706fda852c24678289240ca37a121
-
Filesize
2.3MB
MD5e1f965ed5a08f8aee081e63faf933bfe
SHA131b4e8b443e843cc63c34ef248c564fd3cdd42d2
SHA25659d2d9dd8c0c206099c5bbafdacdaaf9c007668899eb5ed89ae62b9ee3abd687
SHA5122d9f573069a0672272c50efbcfba0e7bda0fc135118416838cf0e6d8e0af1ee23d13d655a1ec1493b6ea6d88b8ef95ceab37bdcc1e12b7515b4b40290a7f3c34