Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
3da3cd3cef29e872e0438cb11eddd13f
-
SHA1
a1b70609fab7fd052ddbdb385737a0885c5139b1
-
SHA256
6219271493eb2bca22705d9b3e1e1743c9e01fb4190a1ce08584206c5fc091bf
-
SHA512
f34bb2b4a61edf51dc3ea8c177ce46c80d716217dfa96b418132a87696deecf43f472acf29b87eb7adbb132dfffa9ecbd4a9a71792e13e2ee44ed7b35a77fae1
-
SSDEEP
12288:oi7O7HmuPfGm5WWHLHnbSAgtobd1JY4R3ia/2wBeASsDdbupZimMNA/oAVkjIEsT:oKbm5WWHfCy1J/srooswNMtIAo7oS
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3064 3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main 3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3064 3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe 3064 3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3da3cd3cef29e872e0438cb11eddd13f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
5KB
MD5036af3fceab406a0f64c0f52034f76e5
SHA16db1a1e1085e23a33719865a5fbef4e722cf9518
SHA25679bdad673a5b1bc6a9df2415ccc8283370441c060be76a425e3c44132b6676e7
SHA5126fb28664c5a82b1eae33bb95e69aa2da533cb8b1137630855b75b48785b93f1af8d636a22570a5cbe2f667cccb307ebc1b0a434e10cee29670dd4eadc68cfe07
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
25KB
MD571c80dde59856b701903b2fc0f91b075
SHA110265b56b1db49ec524b6832e14b0b4f08f26e1a
SHA25645a11c15657eafada47d1b40f23ad47a067b6882c45f7d2e1754305aba40db4e
SHA51235bc4a16852e589e3654f50dd2822e8310cc3f9287f95a7df6d8756af6e461822123d134aff7190c40bfed5545400b0dc9d30f70126750e0c45fb3d9902738d6
-
Filesize
809B
MD51c6138108b31f0ad1c8f22f6f569f6de
SHA1d6f3a9b3af755183b8fad5e00a3f00c81053d66a
SHA2568b07d29151a7af1ff97f312e972e1609c50890cf0787c3b9e860bae853321040
SHA512b539d67d669af93c22b33c431473a310bb983e4979caed6a74bf1993cd949714f42aad157c3357e2cfac2cfbffb6c3fda9d6e7e4089fdca8996d5b752c571901
-
Filesize
1KB
MD5eda0f9fe2914bc66f4ad4861f6db1a1f
SHA1ad525e4558276d81b52c2fc8b6d09352a270ee1c
SHA256e325ce8afd3f60969a3465d0a221d2f023e1c4fa88a48b551328ab715c5bb8fb
SHA512ac7bd622f6a1eae051e29f59f8010d44ca3293aa89549b0e2575655cb8e21012517f5c3cfc0f73ef3b48dff78c84ec79d51cc3c8cc7e5e6cf16ece2c6e9aece2
-
Filesize
1KB
MD502931901ed9381a0ac04384ddc55a8ae
SHA1fe447aff5155d46dfde8570caa1c5b2e30b7a2c7
SHA256216cf446b17585d388b1105409c8c24aa962e6ab1f660d6959c7f8ffcf6aa103
SHA51203c89f7918058b4013b1ca9151a7be314a0ba2bc02cc56961e6a6fde8fb516b84ec37268644f8bba730f64073e3e6d15e404912c4d3e85a5a5e1d2df2badf29f
-
Filesize
1KB
MD5b6e30cf41d44ec03cdf9cb05c622f8e3
SHA1885ac809976d64dd7fafe92df4cb615521766ed3
SHA256342b0b36ee6c9922fcb6f1add3cf46b5e41dc2d0fd8572481467dcc3c05c27dc
SHA512522717ef48698f5dd3985a0477608bee6dfd0d2344e573301112461f83c0ee5fbe530b99e001e61ab1d76817d7ad32219ea9c8a7d39f95599a5e358903bf0b53
-
Filesize
236B
MD595cbac4dc07f686c45f154a394e67869
SHA18fdca7e090767be4e422371fb0dbf03b4ad8352e
SHA2563e12544469963fbeaeb1a7bc9de7026bcf639bf17c3ae424b2e4809058578a5d
SHA5126d99ff303b6da5ec950894d93a7baa82a328aa517e461a2d8a625f9728afbc03116bbdedbdde9b61abedc203b2c64ce2fba2bbd86dc4099f391c931e6f5225a9
-
Filesize
10KB
MD557ca1a2085d82f0574e3ef740b9a5ead
SHA12974f4bf37231205a256f2648189a461e74869c0
SHA256476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA5122d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c
-
Filesize
1.0MB
MD53da3cd3cef29e872e0438cb11eddd13f
SHA1a1b70609fab7fd052ddbdb385737a0885c5139b1
SHA2566219271493eb2bca22705d9b3e1e1743c9e01fb4190a1ce08584206c5fc091bf
SHA512f34bb2b4a61edf51dc3ea8c177ce46c80d716217dfa96b418132a87696deecf43f472acf29b87eb7adbb132dfffa9ecbd4a9a71792e13e2ee44ed7b35a77fae1