Overview
overview
7Static
static
30f7297aeaa...18.exe
windows7-x64
70f7297aeaa...18.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3casttipv2.exe
windows7-x64
3casttipv2.exe
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExistFiles.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExistFiles.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
casttipv2.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
casttipv2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
General
-
Target
0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe
-
Size
316KB
-
MD5
0f7297aeaa068389ac52ee6a0eded319
-
SHA1
08f61b9d2264ac673101027d160d97574ac30f2f
-
SHA256
1a1c78e16493a4a4ecfe771a0fd9542054ddde9b581d54ce2fec6003473d6e70
-
SHA512
c8726cb26035c32493b1eb7c9227b477459f78e08321ba94f6b7de289e951ebb50c3f2d2b310c6c715283b0005ae0afca70e3d12bb9227e2ee64d439f69ab18a
-
SSDEEP
6144:JsVbo5sCjzrB0kvVinJeKQdBXWIoB0A/rqQ5Kq82rQrpMaiwu:6bCsofVinQKGBW0A/rqgNRfp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 908 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\casttipv2 = "\"C:\\Program Files (x86)\\casttipv2\\casttipv2.exe\" /run" 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\casttipv2\casttipv2.exe 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe File created C:\Program Files (x86)\casttipv2\uninstall.exe 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe Token: SeBackupPrivilege 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1032 wrote to memory of 908 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 29 PID 1032 wrote to memory of 908 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 29 PID 1032 wrote to memory of 908 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 29 PID 1032 wrote to memory of 908 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 29 PID 1032 wrote to memory of 908 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 29 PID 1032 wrote to memory of 908 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 29 PID 1032 wrote to memory of 908 1032 0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f7297aeaa068389ac52ee6a0eded319_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c \DelUS.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228B
MD5f4797b67066cbf516cb340f0f26aae05
SHA1a6ab4671e72bd5dea4b2fae29beeaccd215850a5
SHA256e69a69f816fc156ef75c3b58abffb2065557681d915d0dbcb5660385111907df
SHA5125530aead702d2dad664497edfecd7f823ceede13be118b85351f12389a95b30eda9702081e9c24fd1360a0d64232bbd2877fa6953b42532db68b3585a2202ff4
-
Filesize
180KB
MD5a624d57d409bad4044f0d90268d80ed1
SHA15e5d146e01c5610ad6f1652de8682cf1b87c2c0e
SHA256872f23f174b586155200eb593e63bb9612362d31073d3e53961a83a4fc45c6d2
SHA51261b287ee535da481ab5e0ef9731ca4385fb6fd9bc11b9a84f6f1c6cf286d5c255bd9f9e3263c02662acafc6ebd6fb99242f752d5210abf5c317a810ba0e00c3f
-
Filesize
28KB
MD5d825e4003d1697fd4bc45361e222746c
SHA1e9d4b1073aac15d4dbb430471fcaea549e633d13
SHA256c79e4be74eecf16f2f7f1d39724c938bf372e9568bb96fa4610926a57fe323f5
SHA5127740a18cae5a42963c748a49ac6175482c93b34dce703a7cf24f5828ee6cdc19eb2669a634b64c2a4c861272f7e9b9e943455195a7cd6afcd8fa5586744eb86f
-
Filesize
24KB
MD57bf1bd7661385621c7908e36958f582e
SHA143242d7731c097e95fb96753c8262609ff929410
SHA256c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e
SHA5128317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f