Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe
-
Size
723KB
-
MD5
2749759db005d1146d1fbf99cde4700e
-
SHA1
557e31009e878e1fb4a8920b464daa18ebca484e
-
SHA256
01b016405ff19829bd52e4ca9892a946e515095ce03d8fddb71e0cdad8c34d13
-
SHA512
77f88791eb9b0053ae0e487526342efce8dd32c957243933fe2decbeb6cd7191bb72df8442d39abd1e3fcb4029b279e8cd286e2ab052cf25c6f09883a7ab57c1
-
SSDEEP
12288:XvrY5JS2WIATTJUNPxxc2QNTv7IozPkJMeb+kUSQIqhXuND7Zl20suy3HVeUKqJg:XvU5JS2eTTJUi2QJ7rTkJMG+zSQR4ND3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000173de-4.dat acprotect -
Deletes itself 1 IoCs
pid Process 2224 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 Yiesrzucs.exe -
Loads dropped DLL 6 IoCs
pid Process 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 2904 Yiesrzucs.exe 2904 Yiesrzucs.exe 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Yiesrzucs.exe 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe File created C:\Windows\SysWOW64\Yiesrzucs.dll Yiesrzucs.exe File opened for modification C:\Windows\SysWOW64\Yiesrzucs.dll Yiesrzucs.exe File created C:\Windows\SysWOW64\Yiesrzucs.exe 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x00080000000173de-4.dat upx behavioral1/memory/1280-6-0x0000000010000000-0x0000000010128000-memory.dmp upx behavioral1/memory/2904-28-0x0000000010000000-0x0000000010128000-memory.dmp upx behavioral1/memory/1280-59-0x0000000010000000-0x0000000010128000-memory.dmp upx behavioral1/memory/2904-56-0x0000000010000000-0x0000000010128000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\542c74471fd58e1c01e4057d05a2eb49.dat Yiesrzucs.exe File opened for modification C:\Windows\Fonts\542c74471fd58e1c01e4057d05a2eb49.dat Yiesrzucs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Yiesrzucs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2904 Yiesrzucs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 2904 Yiesrzucs.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2904 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2904 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2904 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2904 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 31 PID 2904 wrote to memory of 1188 2904 Yiesrzucs.exe 21 PID 1280 wrote to memory of 2224 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 32 PID 1280 wrote to memory of 2224 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 32 PID 1280 wrote to memory of 2224 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 32 PID 1280 wrote to memory of 2224 1280 2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\Yiesrzucs.exeC:\Windows\system32\Yiesrzucs.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""c:\2749759db005d1146d1fbf99cde4700e_JaffaCakes118.exe_And DeleteMe.bat""3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5d2eae0e5e00a65571074275be5697e8b
SHA15ba7070aab0fb43650a82f46427126d143268759
SHA256c763becd467d5d9fbbab434bd424be5b22d2f9ad4d4ed4020bd2ab9808d545d9
SHA5126f27b6eea1c34bfe3c93c5e4de38af3d7bd1a4947cb27b9210e6b71194810430ba29886278c5e498b1766c08ba8d5ff9000d978733fe2f1e7a2eff738b4b6d96
-
Filesize
72KB
MD5f79ee77a4f30401507e6f54a61598f58
SHA17f3ef4945f621ed2880ff5a10a126957b2011a17
SHA256cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8
SHA51226ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
407KB
MD5783a2f0cc9d2c13f2cb980b5bd198005
SHA1a1bafe779952f61946fe9003e48dddc65184c6da
SHA256e21bf808a0f4c0d6e971267bb61cb00bd9acf45ddabd6db90f906ba064a3489f
SHA512c35d6a39658722dc603e372c92ef18fe7700bfda435230cf5fc39c61c3044481a581cfe797c88fd131e6ecb5940ac31423b33b86b2d52e57df2a1c5669e2bbdc
-
Filesize
723KB
MD52749759db005d1146d1fbf99cde4700e
SHA1557e31009e878e1fb4a8920b464daa18ebca484e
SHA25601b016405ff19829bd52e4ca9892a946e515095ce03d8fddb71e0cdad8c34d13
SHA51277f88791eb9b0053ae0e487526342efce8dd32c957243933fe2decbeb6cd7191bb72df8442d39abd1e3fcb4029b279e8cd286e2ab052cf25c6f09883a7ab57c1