Overview
overview
7Static
static
34637b45816...18.exe
windows7-x64
74637b45816...18.exe
windows10-2004-x64
7$PLUGINSDI...am.dll
windows7-x64
3$PLUGINSDI...am.dll
windows10-2004-x64
3$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...fc.dll
windows7-x64
3$PLUGINSDI...fc.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWaitForKillProgram.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IEKill.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IEKill.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/ShowAddressMfc.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/ShowAddressMfc.dll
Resource
win10v2004-20241007-en
General
-
Target
4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
-
Size
115KB
-
MD5
4637b458169f1a616b39dbd69be2c588
-
SHA1
fd8e3085fa61867d9ab71dec5772eb3b1bb4022a
-
SHA256
a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8
-
SHA512
15b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f
-
SSDEEP
3072:SXu/MVID9mJ0oV2vDVylswCRWBifUQsNzQEnvs4M4:SjCQ2vRylqRuiNsNdnvs4t
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2356 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 2356 Au_.exe 2356 Au_.exe 2356 Au_.exe 2356 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x000800000001613e-2.dat nsis_installer_1 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2356 Au_.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2356 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2356 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2356 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2356 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2356 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2356 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2356 1732 4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
586B
MD5c53e78ca7ccd5b453e60630734def424
SHA1de67fecdba79c484fda5c7e486c27b11a43dc782
SHA256cef4ab466bcabec485f67c7cb9748dc17ab13fd35945dfdbf6a685fa26c286e2
SHA512fc88731e083fd8a9c413495795c4a2f86ded6fa5ef0cd441d49c31911720e0ccc356c547c467e5065fb115df92d37dd85f8b55a3aa1342a9e9e79fe8ffdaebef
-
Filesize
12KB
MD507f3b3445f66e1089567796bf3c8be78
SHA1851eb574c1067b23a654f8aa47b17ef599b24d1c
SHA256a505e6c537a5ce0166227dda9f7671605395592ac9f1a3764e8a01b713939db1
SHA5128c56308fff3a947b26fd0d98dbdd96c406ddf967f5d7abee8cba082b6c46a4e575094bb0bb981551ac5160bb5089cf6fb125dd17a659c427e28c07402adab1c3
-
Filesize
115KB
MD54637b458169f1a616b39dbd69be2c588
SHA1fd8e3085fa61867d9ab71dec5772eb3b1bb4022a
SHA256a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8
SHA51215b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f