Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
0a65588a9196e5fa84e6bf7833140998
-
SHA1
17cb241c28efef6c382cd49385dad7bc8be646a1
-
SHA256
e91bbc7a3407956d8e7df2f24b875b8cf01b89f3d619c1af8906b1a5299498aa
-
SHA512
aec9e3a4e22c8bded036d7128a1a197f130e19d802930121d2afca08d502d86aa6ba84d752ac4ba960ff3e29439c938c07872d0273df0c0dc514396f8e81298b
-
SSDEEP
98304:CNBf4LJfDU5+pZ5kCqGorFB+pKgvLdC9+z8e4KU9I:CNh4HnkCqfrr5gjdE+z8ooI
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2660 ~DPD3A.exe 2824 ~DPD99.exe 2828 ~DPD99.exe 2792 winlogon.exe -
Loads dropped DLL 19 IoCs
pid Process 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 2824 ~DPD99.exe 2824 ~DPD99.exe 2824 ~DPD99.exe 2824 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe 2828 ~DPD99.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nvchost = "C:\\Windows\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nvchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~DPD3A.exe" ~DPD3A.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\0701\Intel32\iKe13F7.tmp ~DPD99.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\0701\Intel32\iKe13F7.tmp ~DPD99.exe File created C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\0701\Intel32\isp1393.tmp\temp.000 ~DPD99.exe File created C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\0701\Intel32\isp13D5.tmp\temp.000 ~DPD99.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winlogon.exe ~DPD3A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~DPD99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~DPD3A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~DPD99.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2792 winlogon.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2660 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 30 PID 2184 wrote to memory of 2660 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 30 PID 2184 wrote to memory of 2660 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 30 PID 2184 wrote to memory of 2660 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 30 PID 2184 wrote to memory of 2824 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2824 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2824 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2824 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2824 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2824 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 31 PID 2184 wrote to memory of 2824 2184 0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2828 2824 ~DPD99.exe 32 PID 2824 wrote to memory of 2828 2824 ~DPD99.exe 32 PID 2824 wrote to memory of 2828 2824 ~DPD99.exe 32 PID 2824 wrote to memory of 2828 2824 ~DPD99.exe 32 PID 2824 wrote to memory of 2828 2824 ~DPD99.exe 32 PID 2824 wrote to memory of 2828 2824 ~DPD99.exe 32 PID 2824 wrote to memory of 2828 2824 ~DPD99.exe 32 PID 2660 wrote to memory of 2792 2660 ~DPD3A.exe 33 PID 2660 wrote to memory of 2792 2660 ~DPD3A.exe 33 PID 2660 wrote to memory of 2792 2660 ~DPD3A.exe 33 PID 2660 wrote to memory of 2792 2660 ~DPD3A.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a65588a9196e5fa84e6bf7833140998_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\~DPD3A.exe"C:\Users\Admin\AppData\Local\Temp\~DPD3A.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\winlogon.exeC:\Windows\winlogon.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
-
C:\Users\Admin\AppData\Local\Temp\~DPD99.exe"C:\Users\Admin\AppData\Local\Temp\~DPD99.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\~DPD99.exe-deleter3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821B
MD54a685c290ac66d71788580108ed65039
SHA1df6c2c4604ebf9aa015a66b8870eda2d6a345942
SHA2563440a041c6f1f36b130d3c29c8244013fc8d4f6b2c73049f06cefa63100f1bfc
SHA512ff2d6ad5709ba9c32d6c76f06ca89f93ab319ebd1e60db9e3bde8498d234513c474cd0e5e557cf604c8ba1165ba122687da7d38d14e8784a6fbcae62fbae4822
-
Filesize
155B
MD54e89262589bf5a5283300c67cdefe040
SHA1d4ec507f21f1f2d39152ac9e3b28d215bdf8efc7
SHA2561733745b3593ad0a57cc7ed38c81cc1cb75cb44f147128a3a08820693f7ace42
SHA512eff46e16c7d7f1d6ddb05bb865ab29d8b471547b86414880f234c71e65a8e08ebaf04953b427376eef4bda789900ea75b6e5a0d3f637f37c08e70a9ada61f414
-
Filesize
321KB
MD5173bddccc829d682046228b9a0a8ad8c
SHA14aadfc3c29a36f77cbe81e98cba0e59e6e620d06
SHA25603e5ce8633b074b0a336ff5c5616318919e3b0a2291d381614858bdb35665ae9
SHA5123a0f5bc0143cd548c14eaddc494a0646172164f6b7c81d1576714bfc6b58e027407d954e3a14bd81ab805fa25bedb1bc50ffce2ec45213d29a146def2cd658b5
-
Filesize
430B
MD5f08b2efe62258456df12eb4a824b281b
SHA13eb29ccd0e823fb70c4a75aa41cc05aaf89553f5
SHA2565fbc5c80e8c9aaf9172ee938f3ebad17132248c3b43c7acbe66ded83417e4cdc
SHA512ea58bf7bb963840605219b1c267bf2257538e1ffe94e4202d7d1fdca565211a820c7a6181051a32e2d1744c548885173ff428c66c8055e2840b7c5a25920c471
-
Filesize
144KB
MD57d206ffa959599b822512f184047f7f1
SHA12ccb525e2813d51bb37133bc33d0740355a3b4c3
SHA2564466f4c424b139190b74137d9ebd901c7b1b1a9e2467d1607b048eb64a1011af
SHA512b8f0b75a2486de4382177e94b622a73dee6e3ad9618872eb7747f082a5965591ba80d14c14ebf15ea93be892f494bdeca5a601d03e0a868df66170af8cfa03e7
-
Filesize
149KB
MD543fffef9a91b39fed4196111bac39640
SHA19ce849f11188da639254a77d3f4e31db36a752d2
SHA256d6fccdbe022be8d79dd40fa3d1bc29c284c19a3471cc5b7db7657496c1381d61
SHA512ce9f61feaf874944bc4d8301565e704ae8dc263d702a0753f350cffccc5be7f6c7973dac21268031be9033c3b19675e55c40f6c8bf30069a2b33f5f44ec334cc
-
Filesize
680KB
MD58230d489547e2f1c0af852f81d1d63be
SHA195e4ae5e66f60d51a29a007869e3f380d82549f4
SHA2567b5542d5c304f3f5ada9eedfa3fb82c28bec97a0d49e9f0ddf61b7a65006e301
SHA5127a75352290c6595ec47eb9698626adbeef8b4a4c62399e0620d6fd7fc40fa9adbd49333bc53c21dffdedb89486d13f9b18502ee23ab8394a5a8d51834dda82ed
-
\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\0701\Intel32\isp13D5.tmp\IGdi.dll
Filesize160KB
MD5150f19ffcf1c56e3c5f77eb712d0310b
SHA1ee29d37fe83ac48c00b5a15ef8073a653ac3354d
SHA25663e799505ac9f425a9ae000adf438812d50cb7b92de50d4e45e042af704af49c
SHA512e2bef9203abbd6934a16bd43c3f8975a69eca3c9ddea66d76dfd97fafceadb8779ea3c2b1f75787e7f909357ef636f5964a903148190886cee35a81668780e49
-
Filesize
276KB
MD5e148c1132a32ccd424de346f2ffead1f
SHA1d2eb1757293ae29ee6039d767953c85f17252915
SHA25604e326274a3f687e7640a0219a53b7f59d61ca6e6f7320fde5d2eb7fa01290c5
SHA51296a12bb1a6405e6d5b17b9bc0e8ac36d2bdfb5ca7a371dac7a806aa260dd24337dd6f7a9703d11196dbf77ff6b87c2e497ff07ff50fb9134e2aa61782ff2c0b9
-
Filesize
156KB
MD54ed4fdc51790b92c9bf0500bdaef7126
SHA149ff61012ff09d1740939ca2c295c011707a92a9
SHA256136080043058565cbed31faa197c2b9019b01f532abd2c87c9dd38b635c54e3a
SHA51250bee0eb216e41ef7d5134036301d71f944aaee5805711688b550521c3ef46d293ccb38c4da1bb55000d788cf199d518f53f28bd3d94a73a0e6eaf40dc7c7801
-
Filesize
4.3MB
MD51eb5ea9749ba238df81442e2e3e569ea
SHA12bc8e2acf73895efb3553b0e586cbe05520abedb
SHA256e668bbdff6b8fac54c2a22444665f3f0636e53f322de9213aa702d0f2dd15000
SHA512031d065b2676086550f623752b181c978ede63afd52d15da8b9b8f1b632202c2d9b796e954f2d987f2cfd713617d6d1039fd3a46e97cd9d65750d7e0e1552b25