Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
12e2d13b6af046d3139157c647aa267c_JaffaCakes118.jad
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12e2d13b6af046d3139157c647aa267c_JaffaCakes118.jad
Resource
win10v2004-20240802-en
General
-
Target
12e2d13b6af046d3139157c647aa267c_JaffaCakes118.jad
-
Size
65KB
-
MD5
12e2d13b6af046d3139157c647aa267c
-
SHA1
b14a4f9fc69c98405232af376d28cfc363e502a2
-
SHA256
ab4418563ff4a13e21689a36040e71a42b9f8c1ed6815f2def8cc1024ff1f406
-
SHA512
1bddb1ff4919bdca6a28183e80c126581ced747bf98a306121fb707286094850044be6aea66c995f7697f758580e436f8e6c4f617a5104736efdca49c666f519
-
SSDEEP
1536:mqPU3JndhRTH66s9cw1o9xcWkRJmXgmdjEQYDelPSTG8rBAg:mqPUFdhRTHeew+x3kRJmXfNEdeJH8rB1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 AcroRd32.exe 2572 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2868 2400 cmd.exe 31 PID 2400 wrote to memory of 2868 2400 cmd.exe 31 PID 2400 wrote to memory of 2868 2400 cmd.exe 31 PID 2868 wrote to memory of 2572 2868 rundll32.exe 32 PID 2868 wrote to memory of 2572 2868 rundll32.exe 32 PID 2868 wrote to memory of 2572 2868 rundll32.exe 32 PID 2868 wrote to memory of 2572 2868 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\12e2d13b6af046d3139157c647aa267c_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\12e2d13b6af046d3139157c647aa267c_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\12e2d13b6af046d3139157c647aa267c_JaffaCakes118.jad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5985f7438cd1f0ac2e67bb1e0d5078e64
SHA18c853ec9435b553eb3fb7e14ffaa3998977ed3ad
SHA256f0eccfe8fb4768e46a03efca0ec957c25a1dc722023a1135e930b1d055d77cb5
SHA5127c48661e0366510690820f0a3c39d64a69a945a31ee158308a05d464ade45dcc474dfe39caa38a7e25817753485a10e8329ac1656c7bdec8db907409db387ade