Overview
overview
7Static
static
305d0a9e62e...18.exe
windows7-x64
705d0a9e62e...18.exe
windows10-2004-x64
7$FAVORITES...��.url
windows7-x64
1$FAVORITES...��.url
windows10-2004-x64
1$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$FAVORITES/ȭٿε.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$FAVORITES/ȭٿε.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DBCount.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DBCount.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe
-
Size
147KB
-
MD5
05d0a9e62e982032084f2383e5e4386e
-
SHA1
be1b8cabba26a9aa4086fa15e3b7f386a841e59e
-
SHA256
f31757dfa48aea3c0f7e36fea02b5c200031b04300cd29572da0d7545eacefae
-
SHA512
bd73842bce377fd69a674e35697e38f88993fe7b9a8e5a90521fb424acc0a568795d01d19d2cb5b7ac922ceb1db29acb0fbf68deadba8dd0dd68191a771ef466
-
SSDEEP
3072:ZAh4oFNDdmJf45Y/B66FYxo8x1luV4l84ZFnOMAv4DqqSna:ZMY5tFSo+1r80OMAv4u/na
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 2940 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe 81 PID 4396 wrote to memory of 2940 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe 81 PID 4396 wrote to memory of 2940 4396 05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05d0a9e62e982032084f2383e5e4386e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c \DelUS.bat2⤵
- System Location Discovery: System Language Discovery
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228B
MD5fc62c0edeaa77d114f0f0001172ee619
SHA111d89169398f476d4679b7adfa5e8a5a36283ecb
SHA25648533ffe13201eaf80fff8f7524c8bbd080eba54aaa4c08dd79d749d3f679fab
SHA5124bd22ae132e21d7881443635b23d0d42f4452c4cb43ecbb67f05aad951ac8cc88f40ff83f9f1b7fa6ddc5697e688c1ff57360b9e8b29718c589c62c3643a6569
-
Filesize
92KB
MD5523c8f7a466a7ab488615c26f972aa43
SHA1de7cee6f1f7a5dcc413fddbb939c844a04c0631c
SHA256343ce0e3713a74f4ee80315e8f03641f44a3328b1bb61ed12157d69dad5a4f34
SHA512bea9486209e0d4ecc851ab8b1cbd68a1bd0a6067b6302c6c7aa9e3fa546940f6f78f4c96e0c324946eddcd67e6f20ccd99375dc4b6ed64df38da6676bf60a351
-
Filesize
66KB
MD5468914ab4ea3afc6fda29031c758394e
SHA1d3b632778a03567efa761401151bfe80d0fe956c
SHA2568a8d78657f0f6b44f18b16e7eea3e62eef6720e04cd2efc820d62bbe987afac1
SHA5120b3df17a3a17a82ba7092ff384c7d820d9f1103fcfa732fb399cf0ff065ec6913a73bea433e19ad787bccf272059e39d196322445d9a6327bb25738f343926ce
-
Filesize
24KB
MD57bf1bd7661385621c7908e36958f582e
SHA143242d7731c097e95fb96753c8262609ff929410
SHA256c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e
SHA5128317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f
-
Filesize
10KB
MD532465a07028b927b22c38e642c2cb836
SHA1309cac412b2ecf6a36f6e989c828afcdd8c7a6e4
SHA256eda545d4dcb37098a90fce9692d5094bb56897f04eff6d40e3dedd122a4d1292
SHA5129d886a722bbbb5d8d77e97d256057fe685f1932042257a8382e13548fe835d01c64de65e2b5ad2c2ff99692b14c924e6ddb84797f6224f1772e8699b421e6aff