Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
2f4fa1ab5bc62071519807bbc4a6b199
-
SHA1
51f1d6e2517d84207a1c0560c8b8608dd3aba117
-
SHA256
efcd32df90d152902953850f2f2252f97b86a477a9e1c3aa1e988ed6ed8716a4
-
SHA512
88b6c79d855fdb50770bdd51f9cc93d2df34d7a3ca38f1c5ee690d2f2300361c37a4a65ce65af03bc0c55e1310e34215842395ce9e5fdcf60e9d47431d8033e0
-
SSDEEP
24576:Uu+1Cp7W2mLIoQoyUN3ZoCh7uRR+Xp/105DASFy8X4pKOwFnqbC9gFWdlM79:V+1AJmLOY3iRR+ZN035IpiFn0C9/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2812 AcroRd32.exe 2812 AcroRd32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2516 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2516 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2516 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2516 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2516 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2516 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2516 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2400 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2400 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2400 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2400 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2400 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2400 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2400 2032 2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe 31 PID 2516 wrote to memory of 2796 2516 rundll32.exe 32 PID 2516 wrote to memory of 2796 2516 rundll32.exe 32 PID 2516 wrote to memory of 2796 2516 rundll32.exe 32 PID 2516 wrote to memory of 2796 2516 rundll32.exe 32 PID 2400 wrote to memory of 2812 2400 rundll32.exe 33 PID 2400 wrote to memory of 2812 2400 rundll32.exe 33 PID 2400 wrote to memory of 2812 2400 rundll32.exe 33 PID 2400 wrote to memory of 2812 2400 rundll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f4fa1ab5bc62071519807bbc4a6b199_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\s1vg2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\s1vg"3⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\s1vg.12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\s1vg.1"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD56334c2ae05c2421c687f516772b817da
SHA10a80baa1797615faddb0ccfaa6d46382a6b3e0e2
SHA256782e02029374527bd2a5fe7b9545df6c2911078e337a62573970b178d93db481
SHA5120a708cb338efda1b923da3aa3b9c5bd1371776e503719fd90a1b5cae05bc64c28aca3e801b81738324adf8de61d09204a1b1ffb07bb96a0ec35c2f01d85af93d