Overview
overview
7Static
static
531183a0930...18.exe
windows7-x64
731183a0930...18.exe
windows10-2004-x64
7$EXEDIR/XD...ch.exe
windows7-x64
5$EXEDIR/XD...ch.exe
windows10-2004-x64
5$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rl.dll
windows7-x64
3$PLUGINSDI...rl.dll
windows10-2004-x64
3$R3/XDictpatch.exe
windows7-x64
5$R3/XDictpatch.exe
windows10-2004-x64
5Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 17:30
Behavioral task
behavioral1
Sample
31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$EXEDIR/XDictpatch.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$EXEDIR/XDictpatch.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/waterctrl.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/waterctrl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$R3/XDictpatch.exe
Resource
win7-20241010-en
General
-
Target
31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe
-
Size
394KB
-
MD5
31183a0930ddbe6ca5a8e022b688fa44
-
SHA1
b481d21d7236533dcb7851a4aa55fa291bdc9323
-
SHA256
1988db582ead736b617e8ffa360baa905b8ed8ace1f3ef4eb9af7dfb78ebfc49
-
SHA512
f878e98ba6d8712539d49748cce5a08fd74969729cce7b8846f8d090b2a23b085ea8bd8326922d417ffd30efe0d36d70124e76114abf83146e7b0f35d88e03f2
-
SSDEEP
3072:q5cs2qmopA1xXbcZHcAxBf5WNe4fa7Zfca9HoBwKcWOojllM6doXJrB0THG1onXz:q/npA1BQ9DJZfca9HqCl6giRnGYgPvnY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2676 ~GM9666.exe -
Loads dropped DLL 8 IoCs
pid Process 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 2676 ~GM9666.exe 2676 ~GM9666.exe 2676 ~GM9666.exe 2676 ~GM9666.exe 2676 ~GM9666.exe 2676 ~GM9666.exe 2676 ~GM9666.exe -
resource yara_rule behavioral1/files/0x000800000001662e-1.dat upx behavioral1/memory/2676-6-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2676-11-0x0000000000240000-0x000000000027A000-memory.dmp upx behavioral1/memory/2676-247-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~GM9666.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 ~GM9666.exe 2676 ~GM9666.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 ~GM9666.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2676 ~GM9666.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2676 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2676 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2676 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2676 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2676 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2676 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2676 2032 31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31183a0930ddbe6ca5a8e022b688fa44_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\~GM9666.exe"C:\Users\Admin\AppData\Local\Temp\~GM9666.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51a55310e762bd1ce89374fb294e17ea6
SHA19266bc3632c641af6651b1db9e94016026ddcbc7
SHA256c77a1b32861ad6f9b2173e72520709d759da1cd4f0dd1f8b9b79e82ba928e0f3
SHA512cf58fb71ac10ef86f9702ce69ecab24a0778fe9509bbd41dcffc13648936f9894232c142e92a839e7a2c942587fdfc88f85c86c0532edba4523d29edf14b836f
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
15KB
MD59a886711c559308c39c01c20e9d9a1e3
SHA10f27cf1cf6e4960e140651b68d72ed4b92c58e9e
SHA25698be8860d38ad9cf31b55a1a04594de59eabad67510ba2a33ed20a80863ddfa4
SHA5124dabdd9ea7a8330a367589a3975a9dc7286b82c66efc7db118b4d7a2db08a467851c6d3dc991668e13c4dd5473aa974e9696a2226039db94df8b198da54354a3
-
Filesize
10KB
MD52b54369538b0fb45e1bb9f49f71ce2db
SHA1c20df42fda5854329e23826ba8f2015f506f7b92
SHA256761dcdf12f41d119f49dbdca9bcab3928bbdfd8edd67e314d54689811f9d3e2f
SHA51225e4898e3c082632dfd493756c4cc017decbef43ffa0b68f36d037841a33f2a1721f30314a85597ac30c7ecc99b7257ea43f3a903744179578a9c65fcf57a8b7
-
Filesize
16KB
MD5aefd35a23680fda066a05e4b5f6dc88e
SHA18278021d560722701c1f3b91b85ed96bf34bed0c
SHA256bbc65291a3bcfb6559c391e251bca12d6b935a8a8de0825443642aa2b5e39e78
SHA5127ac32589e0bf8889e36184058e1f2ae0a0b6c701188ed18fbaf5b45afcff06eecb760d29e342953d50091fb14ef2ee8fb3285a1ec2c1dadec3ecea18fcfe56a2
-
Filesize
83KB
MD52b14246d7a67f37a586b58aa3129897e
SHA170ce6759240112e72ab4f5fc5f9b943b0d77e4bc
SHA256294c4c11e163ff3e2cb70d472da379a357443a1c8867eafa2de9cf65d8091f21
SHA5123ace76f9e77f1fbfabbe92ea0c01f85db9332150a22d81637e1e6dd795c13b685954ecb34891b5ad84dd258dfa1b9d2624b581894fba51b83732e156443184f6