Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe
-
Size
639KB
-
MD5
3fde466ee25870f284c3f0f02f0c939e
-
SHA1
825837806da2e39255ce97a04dd88f3b84b93af4
-
SHA256
0201cd639a76ae41690463860e19d662b6369b73dc7bba3352948e6431779b0f
-
SHA512
bbc660830f3d4a89c3ea02c6a9a86f31dbd46ec9e5539d1a798353bc4a7660cd06852355f70214144da28b14758ab4fd94840b3821d59ddedc2ea2e4b58c5f60
-
SSDEEP
12288:N+MJfsZx0Dr5rpQRQNp3ENKTWL622JhmCZdSLNanrw8Y07PuSVRhNYkga45m:N+MJfsjeTNp3EyWmZMos8Y07PtVakg9s
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3000-1-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-5-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-4-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-88-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-89-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-90-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-92-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-111-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-113-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-133-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-134-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-132-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-140-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-141-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-151-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-152-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-153-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-154-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-155-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-156-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-157-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-160-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-162-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-164-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-165-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-166-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-167-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-168-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-170-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-169-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-173-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-174-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-175-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-176-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-177-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-178-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-180-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-181-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-182-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-183-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-184-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-185-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-189-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-190-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-191-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-192-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-193-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-194-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-196-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-197-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx behavioral1/memory/3000-199-0x0000000001D70000-0x0000000001EB0000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259439849.log 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3000 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe 3000 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3000 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3000 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe 3000 3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fde466ee25870f284c3f0f02f0c939e_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
5KB
MD5de33eb6c074cd19e5f35fdb9684ac8a4
SHA179e3ee9a50d0ac4df641c7e67e9196134b3c8079
SHA256cb88809b1178adad0dba06ce5bee171b2b80de9d9a171daa880ae907384a2c63
SHA51245b0f7b700ad0c7c21cece8e80f586054a7d24b45846ee25fa55a0f757dacff6a2b907ad604b2b945bf8c901e8eb93e75178a4f9e1420b8df9d5bd93187bd33c
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
27KB
MD573690cdfa0fa656dcaef01ed512adeba
SHA192397a9955cdfd057dcd9b7bf1786179824654c5
SHA25635c4229c12a36fd0642313e4e4d1ae991ca37d3e156425d4b34bfb65b67933b2
SHA512fec791a6d257c494131e068929d9fee4cd222b52fab0c20ec439d16bdabd1c71bd735b1b8ebb42d951019a9b054b6389c5db5e44b5853874ec9d018609161a20
-
Filesize
293B
MD575a9464e6e2e2d8efc82e5285ab0d95d
SHA103aa7ccf18666265cef894adc30aede977116405
SHA2567ec62b84d0c741b8e1f4c735ba37fd4dc889690590cf900073793b8d6e44cd0a
SHA512c52d190454e7d6fbafdd18960b5c95cc76da66ce02b7d0caf1eecc3335ae60b8aeb8b014be9adfaf46cafcdb7342029ec265d64576483cfc2b2439a514d9b63c
-
Filesize
294B
MD5aa5fc77754056e5cf059ae73ae3ffb93
SHA1d6dea0e225dc926506c9c1bc8d9084cbaf7cc350
SHA256cb4b816b428001c2756dc75791598a256ff2774c5dc9e87253ae77b5aaed8da0
SHA5121c61531ed01bd48af185450f64f6a908784a4846085044109cf18f385592f783ae6c9b99cffe95b4d6fc1108fc2cebdfeccca30a01c682f5d47b019429b0e8a6
-
Filesize
2KB
MD574e2fdcc7a0e8161c160c2614a67801c
SHA143a3ccee7e8e9f1448982662e567d1311e21b5fd
SHA2566608965b76e3c0f43eb9ca66c75f5b916ae7348ef7250de5413dad735cde9398
SHA512a7da8a7330a7beab2fd5e04ca3efc917c933cf8e4dadad531a8ac11e8add814890b4693ec9393408230e61e3a934075334953bd1ebadc6938bedf6a11c93f8c3
-
Filesize
2KB
MD574900169442a73b94a452a43bde17248
SHA1b211e593a3bc6559482ddb707399d7b7cf08d331
SHA256c2e7c5e031b4e7bcefa800de4659c8c1ca072ad074d15860583588962beea9b5
SHA512e0a24cf32e8865e9021e161f66f9c275f777ab592e3bb365dd568963aa998612e1dfe9eefdd71e3239ffb43657ef1f86367410192c7769968e9ecfcb6b6ef4c8
-
Filesize
1KB
MD5aa1424f218bf3befbcca3c4c0e42a365
SHA1c91d5dce4ebd543d905026577f8a05dff1d8357e
SHA256e1a823582add59d1406fd36d3f7f86f98873e3201168e542cb49239d6c525ab0
SHA5128ef2ea9613ff50bf028c9ef4611326d61b1cd07d01b89631faa2053449fab9a746e06e59a176dd5cda4f02f77fca8eedbb6e46ae4a78afa416ae8adb7ef0d93b
-
Filesize
1KB
MD561b27f16ef13d3ad95833dd3a932f307
SHA19e0866a07c8309b8f5fb3fbec98531f2ebfbce6f
SHA256be3dee9b5d9f2893607ff916b3c3313987a16092230650dbaeec6e9e36c63ad2
SHA512c3d6a15a826c990bd77c4d2581fe8791fb71346477ee360af50f96a7521e83f5ae89c520af221a737787684eb2b6a714afe9e6d770d9103de4fcc18f767283a0