Overview
overview
8Static
static
729a0837edf...18.exe
windows7-x64
829a0837edf...18.exe
windows10-2004-x64
8$TEMP/core_keygen.exe
windows7-x64
8$TEMP/core_keygen.exe
windows10-2004-x64
8$TEMP/svchost.exe
windows7-x64
7$TEMP/svchost.exe
windows10-2004-x64
7$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3messenger.exe
windows7-x64
3messenger.exe
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7Analysis
-
max time kernel
144s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:00
Behavioral task
behavioral1
Sample
29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/core_keygen.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/core_keygen.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/svchost.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/svchost.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/md5dll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
messenger.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
messenger.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240704-en
General
-
Target
29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe
-
Size
308KB
-
MD5
29a0837edfa46ec5cacf0304f52547f2
-
SHA1
6352b7b54135e4009fa2cb1effdd2cde11780b1b
-
SHA256
be5d61b1d8b086ca497b5b514be0cadf81c739d89fbea472f5ae2f216255ebe7
-
SHA512
a9d56d5be289112e8c35af5f99b28de88f8a0eef7d567926d10cfad0a62c57719f83eec6d066d8ac337eda624ff8e2d1c92a3720abe62b0135489b6fcac331a3
-
SSDEEP
6144:S9k1/S4wVe34PFe6UyZtnl7Hse6UyZtncsLDcZbBy:ck1/SPrFntnlDseotnc2Dy
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts core_keygen.exe -
Executes dropped EXE 2 IoCs
pid Process 1952 svchost.exe 4992 core_keygen.exe -
Loads dropped DLL 7 IoCs
pid Process 1952 svchost.exe 1952 svchost.exe 1952 svchost.exe 1952 svchost.exe 1952 svchost.exe 1952 svchost.exe 1952 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\messenger.exe = "C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\Web Components\\messenger.exe" svchost.exe -
resource yara_rule behavioral2/files/0x0007000000023c97-7.dat upx behavioral2/memory/4992-9-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-49-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-50-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-54-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-57-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-61-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-65-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-68-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-72-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-75-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-79-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-83-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-86-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-90-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-93-0x0000000000400000-0x000000000049D000-memory.dmp upx behavioral2/memory/4992-97-0x0000000000400000-0x000000000049D000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\Web Components\messenger.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Web Components\messenger.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language core_keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000b000000023c8f-5.dat nsis_installer_1 behavioral2/files/0x000b000000023c8f-5.dat nsis_installer_2 behavioral2/files/0x0008000000023c98-14.dat nsis_installer_1 behavioral2/files/0x0008000000023c98-14.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4992 core_keygen.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3480 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3480 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1952 1148 29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe 85 PID 1148 wrote to memory of 1952 1148 29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe 85 PID 1148 wrote to memory of 1952 1148 29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe 85 PID 1148 wrote to memory of 4992 1148 29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe 86 PID 1148 wrote to memory of 4992 1148 29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe 86 PID 1148 wrote to memory of 4992 1148 29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29a0837edfa46ec5cacf0304f52547f2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\core_keygen.exeC:\Users\Admin\AppData\Local\Temp\core_keygen.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4992
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD532548830857307e3137eeffa8accd38b
SHA19730ea50a858842f96bee154d05498dec9064a68
SHA2568b70fec7c2302d2d84a2c4a12da9b5b2819bb0ffb579a8b55da67d36c8bed7ee
SHA5125e773ada78c7492a178d2d23e9df53f45bc55dad3f0b7ee179266c92919fdc41e601983e4d7cde69094d5468ec41d1e0c434df20b5f529fb5f909eba172b0bf2
-
Filesize
19KB
MD514b848866035dea39b912da628307231
SHA1d00c8963aee8038d8a22f098cef69b31007196e5
SHA2566a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc
SHA5124538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
168KB
MD5d5889a5d5c2ddc54645a2838e83f957f
SHA158db610b9ab09e0b361455a7687b0d6b3a822dd5
SHA256d7c6324c8db5372ab2422eea5a3bf25665d92af421e3bbe63aec7f2ba0cd571e
SHA5120a3a53d1f473a6d31647afed30721e7eb2d54bc615f67d457f62a6dff8c8fa0ef2b035eeebf2ab03d053d370e778940e00e62c2fdb258d604f9b43182316ffe1
-
Filesize
1KB
MD563ac5683c8f3b3e56d745fc5703447d2
SHA19f820feefe58177bfaea0721b10b44b9622473f7
SHA2562b1e1f839137a4410387102d923d953f85a9edf9efd3cfa1b7989b4f4fdc2a6d
SHA512633f48541e8d25a29ec70f192d145af0e067a5fc6db47aa00194861cdd923074b76d299a18e73cadc1ee5987a2f5bc2e147f181408c398bcf2e5f460a29b5b2a
-
Filesize
91KB
MD59247535b33135fb573a16b17beba7282
SHA18db9ac95226b3176a715533f933712e6212630e3
SHA2562997c0be3cfc06d7953a3b7dda82e5b9333649ec8ff72c0df98703a0caa46a96
SHA51201115dbf367137f416d580f4a95597ada82e0cbdf3819012cb8c9a2ba79d785774804f315016303170d0eb18aa457ca02442010ff4b89238d1690b611f449311