Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jnlux.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jnlux.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240802-en
General
-
Target
08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe
-
Size
596KB
-
MD5
08407f237626cdebd916ebc12bf704aa
-
SHA1
b453fcbe42473eef1ba4a3e4bc470dc23cd1c394
-
SHA256
608f0026baf16b95de806bfc7efc41dc8be33c7d9b3974e3eb263cb3fca689ed
-
SHA512
b0ed994949fc7a13bf22e4615b0d92604fc6899fc4f2554622c0819278d95ec0b2c290f53f3de23dab56602e71876c4ee080caac283f823e7f3c5078cb962265
-
SSDEEP
12288:1v9quqlGs8yl+eN0FOLI0Gd3TWLZtVIn7bLhbc56C1x:1vnkblrN0FF0GJTsuXLhbTO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 dcfcabfcdcac.exe -
Loads dropped DLL 10 IoCs
pid Process 484 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe 484 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe 484 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3036 2840 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcfcabfcdcac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1856 wmic.exe Token: SeSecurityPrivilege 1856 wmic.exe Token: SeTakeOwnershipPrivilege 1856 wmic.exe Token: SeLoadDriverPrivilege 1856 wmic.exe Token: SeSystemProfilePrivilege 1856 wmic.exe Token: SeSystemtimePrivilege 1856 wmic.exe Token: SeProfSingleProcessPrivilege 1856 wmic.exe Token: SeIncBasePriorityPrivilege 1856 wmic.exe Token: SeCreatePagefilePrivilege 1856 wmic.exe Token: SeBackupPrivilege 1856 wmic.exe Token: SeRestorePrivilege 1856 wmic.exe Token: SeShutdownPrivilege 1856 wmic.exe Token: SeDebugPrivilege 1856 wmic.exe Token: SeSystemEnvironmentPrivilege 1856 wmic.exe Token: SeRemoteShutdownPrivilege 1856 wmic.exe Token: SeUndockPrivilege 1856 wmic.exe Token: SeManageVolumePrivilege 1856 wmic.exe Token: 33 1856 wmic.exe Token: 34 1856 wmic.exe Token: 35 1856 wmic.exe Token: SeIncreaseQuotaPrivilege 1856 wmic.exe Token: SeSecurityPrivilege 1856 wmic.exe Token: SeTakeOwnershipPrivilege 1856 wmic.exe Token: SeLoadDriverPrivilege 1856 wmic.exe Token: SeSystemProfilePrivilege 1856 wmic.exe Token: SeSystemtimePrivilege 1856 wmic.exe Token: SeProfSingleProcessPrivilege 1856 wmic.exe Token: SeIncBasePriorityPrivilege 1856 wmic.exe Token: SeCreatePagefilePrivilege 1856 wmic.exe Token: SeBackupPrivilege 1856 wmic.exe Token: SeRestorePrivilege 1856 wmic.exe Token: SeShutdownPrivilege 1856 wmic.exe Token: SeDebugPrivilege 1856 wmic.exe Token: SeSystemEnvironmentPrivilege 1856 wmic.exe Token: SeRemoteShutdownPrivilege 1856 wmic.exe Token: SeUndockPrivilege 1856 wmic.exe Token: SeManageVolumePrivilege 1856 wmic.exe Token: 33 1856 wmic.exe Token: 34 1856 wmic.exe Token: 35 1856 wmic.exe Token: SeIncreaseQuotaPrivilege 2664 wmic.exe Token: SeSecurityPrivilege 2664 wmic.exe Token: SeTakeOwnershipPrivilege 2664 wmic.exe Token: SeLoadDriverPrivilege 2664 wmic.exe Token: SeSystemProfilePrivilege 2664 wmic.exe Token: SeSystemtimePrivilege 2664 wmic.exe Token: SeProfSingleProcessPrivilege 2664 wmic.exe Token: SeIncBasePriorityPrivilege 2664 wmic.exe Token: SeCreatePagefilePrivilege 2664 wmic.exe Token: SeBackupPrivilege 2664 wmic.exe Token: SeRestorePrivilege 2664 wmic.exe Token: SeShutdownPrivilege 2664 wmic.exe Token: SeDebugPrivilege 2664 wmic.exe Token: SeSystemEnvironmentPrivilege 2664 wmic.exe Token: SeRemoteShutdownPrivilege 2664 wmic.exe Token: SeUndockPrivilege 2664 wmic.exe Token: SeManageVolumePrivilege 2664 wmic.exe Token: 33 2664 wmic.exe Token: 34 2664 wmic.exe Token: 35 2664 wmic.exe Token: SeIncreaseQuotaPrivilege 2656 wmic.exe Token: SeSecurityPrivilege 2656 wmic.exe Token: SeTakeOwnershipPrivilege 2656 wmic.exe Token: SeLoadDriverPrivilege 2656 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 484 wrote to memory of 2840 484 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe 31 PID 484 wrote to memory of 2840 484 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe 31 PID 484 wrote to memory of 2840 484 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe 31 PID 484 wrote to memory of 2840 484 08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe 31 PID 2840 wrote to memory of 1856 2840 dcfcabfcdcac.exe 32 PID 2840 wrote to memory of 1856 2840 dcfcabfcdcac.exe 32 PID 2840 wrote to memory of 1856 2840 dcfcabfcdcac.exe 32 PID 2840 wrote to memory of 1856 2840 dcfcabfcdcac.exe 32 PID 2840 wrote to memory of 2664 2840 dcfcabfcdcac.exe 35 PID 2840 wrote to memory of 2664 2840 dcfcabfcdcac.exe 35 PID 2840 wrote to memory of 2664 2840 dcfcabfcdcac.exe 35 PID 2840 wrote to memory of 2664 2840 dcfcabfcdcac.exe 35 PID 2840 wrote to memory of 2656 2840 dcfcabfcdcac.exe 37 PID 2840 wrote to memory of 2656 2840 dcfcabfcdcac.exe 37 PID 2840 wrote to memory of 2656 2840 dcfcabfcdcac.exe 37 PID 2840 wrote to memory of 2656 2840 dcfcabfcdcac.exe 37 PID 2840 wrote to memory of 2264 2840 dcfcabfcdcac.exe 39 PID 2840 wrote to memory of 2264 2840 dcfcabfcdcac.exe 39 PID 2840 wrote to memory of 2264 2840 dcfcabfcdcac.exe 39 PID 2840 wrote to memory of 2264 2840 dcfcabfcdcac.exe 39 PID 2840 wrote to memory of 2536 2840 dcfcabfcdcac.exe 41 PID 2840 wrote to memory of 2536 2840 dcfcabfcdcac.exe 41 PID 2840 wrote to memory of 2536 2840 dcfcabfcdcac.exe 41 PID 2840 wrote to memory of 2536 2840 dcfcabfcdcac.exe 41 PID 2840 wrote to memory of 3036 2840 dcfcabfcdcac.exe 43 PID 2840 wrote to memory of 3036 2840 dcfcabfcdcac.exe 43 PID 2840 wrote to memory of 3036 2840 dcfcabfcdcac.exe 43 PID 2840 wrote to memory of 3036 2840 dcfcabfcdcac.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\dcfcabfcdcac.exeC:\Users\Admin\AppData\Local\Temp\dcfcabfcdcac.exe 1-7-2-7-4-5-8-4-3-6-8 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2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81727832472.txt bios get serialnumber3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81727832472.txt bios get version3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81727832472.txt bios get version3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81727832472.txt bios get version3⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81727832472.txt bios get version3⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 3683⤵
- Loads dropped DLL
- Program crash
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
828KB
MD51370880272e6977e5bb6f68f111cfd03
SHA105e8dd2e4944b2617547fa123861b0013c135699
SHA2565d3a331662542d3b30b795cbb9fe18b0cb200078bb4496c369ba0e7855b3fa04
SHA512a633d2dc4ab18ddc7afb5c2adf1238e695d18819d2815384b6f82508f134f2237e1da09b34434c42959d6ca46fc631f2349f44bb91694529c1e86df1071f0085
-
Filesize
152KB
MD50b1a475c07c822fbedd44f9822b1d5d5
SHA19eecb7b904311e1f29e8db00c523d1cd03b3c6ac
SHA256a6a4dccd18e10c3569e0cd74def460a7c9f2f137b5d60b3e9a4636bb3cdbd277
SHA51205b28b3e732539ed73fa5946992f9d273179dd271b5a0e75772222f6d946fe4870e0a111013b5035b0f70bbb77e336150cc42c183133132f17353093c0fb7712
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5