Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe
-
Size
13KB
-
MD5
3d0a495b352a73e2361df387140fd8d7
-
SHA1
a016ec3fab6bb7f451dc42e8cb573ef6e14b3b9c
-
SHA256
d7da39e460637330662f181c3481800658582d4728114023d803fca8d65538dc
-
SHA512
44e5e75667dcdf7a35140c9939b3c8655b9be999b3006967cafc1ea09719ad32846b90bf59c1a973d82c322248fcb7a431f7f5ea223a01628cd0823181930ab7
-
SSDEEP
384:JSETnMZEj5MZINTMKg6Bb7QbmuDWMFCiSsLB:JSmMZEAAT9Bb7Q3BxLB
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\bootvidgj.dll = "{D3112B69-A745-4805-874E-ABD480EA1299}" 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\bootvidgj.tmp 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bootvidgj.tmp 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bootvidgj.nls 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299} 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299}\InProcServer32 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299}\InProcServer32\ = "C:\\Windows\\SysWow64\\bootvidgj.dll" 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D3112B69-A745-4805-874E-ABD480EA1299}\InProcServer32\ThreadingModel = "Apartment" 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2764 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2764 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2764 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2764 3068 3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d0a495b352a73e2361df387140fd8d7_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\8028.tmp.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5af3ea4c2d67b92cde757a1104e281344
SHA1382242a53cd8bdee0d262ae6ef161aba352a14f8
SHA2569bee85255462c58a75ce4ce882c9e329a7d8c3755aace0ba383796716448ce4f
SHA51293c3c569cbc954b22611928c14e1213d0a45388e6711a5a464fe4cc3e570894a3f421e9571fc4a8e715cf19695d842aba71b21b4472a2e5c58d59cb1f6d4f789
-
Filesize
428B
MD5d01923a9d90d44021f9251db2212d9df
SHA1328c5167bc76654070b0e1205429938f6d6cb4df
SHA25677e149e8b78d74a2a49cd311ba19ac3a2274c13949ce57587f60264486bcb971
SHA51261f5cf9c0a34e3f16e4015a1c84c1c5b03cae5b37b018a8d11aaf5fcaffe06d4afa8192099f7c8a08912e24d8378dacdc0e3291ed9eeeb6f86f391aee81cb737
-
Filesize
749KB
MD533ecfb0950d1ef2a16c23aed83071756
SHA1192d732d302297b5c39e481b772abe3c51b11ea4
SHA256e7143f3533700a534bfa838065fd9e633d09b4b4180dfd1b6ae6857897785759
SHA5124e3de83cf950ca0e7e20c74e17fd369b49fa91c781d98895d60a054ffe138678a81d1b584c7b1b978536f3a84b0bfd3e06b9f8e2d2abf8c629198b0ca272b0d9