Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
0ac15cb49bb35c3b1008c7b84772f12e_JaffaCakes118.jad
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ac15cb49bb35c3b1008c7b84772f12e_JaffaCakes118.jad
Resource
win10v2004-20240802-en
General
-
Target
0ac15cb49bb35c3b1008c7b84772f12e_JaffaCakes118.jad
-
Size
63KB
-
MD5
0ac15cb49bb35c3b1008c7b84772f12e
-
SHA1
ae6abe233b0899d6051270934d9f6dbd8c44b6be
-
SHA256
cf56e042412bd9c89798cf015cbbe36710cdcdef58a31be6563044b4c9c4ef4b
-
SHA512
087eabe1dd68edbf863b8a6f6d9fe5650e03fbb519af121ac75cf22cb22601dc5d075ca0b00dfb35e2fb2c65bb452621a6787fbbf496011a080d37be9c1f461d
-
SSDEEP
1536:H2Yfem1E6xtQZsGqAmzHp+8uGxn1w48SlAEY05PoE:WYfh/tQ2KMoFGJyclr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3036 AcroRd32.exe 3036 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2148 2520 cmd.exe 31 PID 2520 wrote to memory of 2148 2520 cmd.exe 31 PID 2520 wrote to memory of 2148 2520 cmd.exe 31 PID 2148 wrote to memory of 3036 2148 rundll32.exe 33 PID 2148 wrote to memory of 3036 2148 rundll32.exe 33 PID 2148 wrote to memory of 3036 2148 rundll32.exe 33 PID 2148 wrote to memory of 3036 2148 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\0ac15cb49bb35c3b1008c7b84772f12e_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0ac15cb49bb35c3b1008c7b84772f12e_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0ac15cb49bb35c3b1008c7b84772f12e_JaffaCakes118.jad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5afaeb72914cb137268d3dff19a4e45db
SHA1f64351794e48280b81c33ea81206d97c74abc750
SHA256f81c0b7b35734bd35d0e69deb9cebc8497a442db80671df8c6070e9c0fd50ae0
SHA512083dcbce15cb5bbd2fcf2c18b7478ddc09b4018c42d0e5298f8c8c02234fa7c9a1891eea09a8ecde032927bea233cd4f805e72c2b01bbc56a70c19cf9a9125e1