Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2a616e4f483dc0ff04de8c49ed557363_JaffaCakes118.jad
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a616e4f483dc0ff04de8c49ed557363_JaffaCakes118.jad
Resource
win10v2004-20241007-en
General
-
Target
2a616e4f483dc0ff04de8c49ed557363_JaffaCakes118.jad
-
Size
80KB
-
MD5
2a616e4f483dc0ff04de8c49ed557363
-
SHA1
140a33cb8be6b98a14ab95e6ee12fc8804eb2516
-
SHA256
f5744838b938a8e968e5ac93cea779512c42f6e387913a48f24f66f84fab5963
-
SHA512
485e4cd623ebbef7c1c8d93f8455a7c98fd8cfc8e9f6c26b1fd1520829604b59cfc4c7cd071f2e5422832e67d605b496e5fdc9cfd555db03f1e46d60e085a56c
-
SSDEEP
1536:UB0tmXB9Ey1gGVP+5MjgKybYqMvkfxLD5y5D/QReVE+x2t:UB0tmx5gQgfbRGkfxLeIReVgt
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2144 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 AcroRd32.exe 2144 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2240 2500 cmd.exe 31 PID 2500 wrote to memory of 2240 2500 cmd.exe 31 PID 2500 wrote to memory of 2240 2500 cmd.exe 31 PID 2240 wrote to memory of 2144 2240 rundll32.exe 32 PID 2240 wrote to memory of 2144 2240 rundll32.exe 32 PID 2240 wrote to memory of 2144 2240 rundll32.exe 32 PID 2240 wrote to memory of 2144 2240 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2a616e4f483dc0ff04de8c49ed557363_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\2a616e4f483dc0ff04de8c49ed557363_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2a616e4f483dc0ff04de8c49ed557363_JaffaCakes118.jad"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57d18d6bb53ca530e12fa3d74cb0c92d8
SHA1d9e7424e6690cb9df202965aeb568e5ebd5048b5
SHA256db651b71f0a79ee71fcf1d083018d6390cac71ea975fb1ec427fe2057bd55be7
SHA512bb4603dc0c279e52b99136ca111771e3bb993ca06dfd3bbb5e2f6fb7ff3381761b2cf57b13f3111c8210444d12dd6d482c0e0b6a34e1f8b5e34aeabe882b4eee