Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe
-
Size
335KB
-
MD5
544d2a3215835faca58328ba66bdb14d
-
SHA1
7041a02c12b5f633a325fce1d3aeab7b56dfe654
-
SHA256
edb49ead0fba64c9c35b15c7b42f8fd5856fde4d89a5eeeef529f06c23521f3f
-
SHA512
62accdf6684a54eab333ea61df36ccf7fe98539702d78aff712a63f822163316c2e1ba5b7372065e17681ce5eaf50915c6c47f3f525edb5084dc2a069292087b
-
SSDEEP
6144:DqhI966AGkAjOpoaY7pGjKa7nuuMdERxSjRSAo2PO4N2Dk:D2q6xGJOpqpaL86ORST4X2w
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\grmynj.sys 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe -
Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MSMedia\Parameters\ServiceDll = "%SystemRoot%\\System32\\grmynj.dll" 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\CONTROLSET002\services\MSMedia\Parameters\ServiceDll = "%SystemRoot%\\System32\\grmynj.dll" 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\CONTROLSET003\Services\MSMedia\Parameters\ServiceDll = "%SystemRoot%\\System32\\grmynj.dll" 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2720 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe 2720 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\grmynj.dll 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe File created C:\Windows\SysWOW64\0004fe30.inf 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2536
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k MSMedia1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD51caf6a6748394fcd28a9db7429169a1c
SHA14f15a30ff22fd6acce7d3ec45723b0f0c2c7379a
SHA256291cac5f006319a3e07ade259802904bb33e681901da9fb3ee6ff5ea4cce51c8
SHA512f1cfa5ba9baf270f1d75cc371d7830d605430960ab36add7ec9b2e71629d54132c8fe8dac409b9e1842e6192b1bd72a70a325c8c3e645b7ee1980f739d8e1acb