Overview
overview
7Static
static
354ec9134a5...18.exe
windows7-x64
754ec9134a5...18.exe
windows10-2004-x64
7$APPDATA/Y...t.html
windows7-x64
3$APPDATA/Y...t.html
windows10-2004-x64
3$APPDATA/Y...w.html
windows7-x64
3$APPDATA/Y...w.html
windows10-2004-x64
3$APPDATA/Y...t.html
windows7-x64
3$APPDATA/Y...t.html
windows10-2004-x64
3$APPDATA/Y...k.html
windows7-x64
3$APPDATA/Y...k.html
windows10-2004-x64
3$APPDATA/Y...e.html
windows7-x64
3$APPDATA/Y...e.html
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3yowindow.exe
windows7-x64
3yowindow.exe
windows10-2004-x64
3yowindow_d...de.bat
windows7-x64
3yowindow_d...de.bat
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$APPDATA/YoWindow/about.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$APPDATA/YoWindow/about.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$APPDATA/YoWindow/images/weather/view.html
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$APPDATA/YoWindow/images/weather/view.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$APPDATA/YoWindow/styleSheet.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$APPDATA/YoWindow/styleSheet.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$APPDATA/YoWindow/styleSheetBlack.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$APPDATA/YoWindow/styleSheetBlack.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$APPDATA/YoWindow/trayTooltipTemplate.html
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$APPDATA/YoWindow/trayTooltipTemplate.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
yowindow.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
yowindow.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
yowindow_debugMode.bat
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
yowindow_debugMode.bat
Resource
win10v2004-20241007-en
General
-
Target
54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe
-
Size
5.1MB
-
MD5
54ec9134a517073b6143faf325fdb0dc
-
SHA1
34931855d8a94abaaea05670b007ca6cc5eaf8f7
-
SHA256
7909a74cb0a861e3d84305d0c1ff821a6b5f68136b53201ba6229776a9d488d8
-
SHA512
f3431390edfd1d32a3e29262026733f2647b64922f554d4890d7f42cf0cbcf0fd5b906fb01ea31b00f3c8c5a7b6cf2a06af0265f4534335c2061eedca818e4e8
-
SSDEEP
98304:pj6bq2gs/XZE6pno/AaHIR/nP3jeCs9WEgaFMBYw0ZVNGHrj6s1+Ki:lWE65o/AcIlnPnQLedgroP6s8z
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4300 RunDll32.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe 4300 RunDll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4552 wrote to memory of 4300 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 92 PID 4552 wrote to memory of 4300 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 92 PID 4552 wrote to memory of 4300 4552 54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54ec9134a517073b6143faf325fdb0dc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe "C:\Users\Admin\AppData\Local\Temp\nsv94DE.tmp\OCSetupHlp.dll",_OCPRD530RunOpenCandyDLL@16 45522⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
5KB
MD59384f4007c492d4fa040924f31c00166
SHA1aba37faef30d7c445584c688a0b5638f5db31c7b
SHA25660a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5
SHA51268f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf
-
Filesize
750KB
MD539b533683dd6bf334b8ed1832c5f082b
SHA1ca833acb83e76cfa92a5aef42db0d61d151490bc
SHA256fae6f456612b8661dd7c1b9bc3252f3b09ba6a7764af7f80c172edb5a4705b1e
SHA512e47aedb5b598a814dbec6f5ec1ea14e9a153672f765c853f163354fdb99d7bcbe02275cae52a10b642eeb26e536a0bffe74868e9dc1c200ef59c54eab439faec
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
597B
MD5b5ed782ecc02894bc770e2bb4bc1bbc2
SHA10bfaea4eb10f4af4a6387f11a5b2578a6a5e27d5
SHA256063397b466d8caed54b58903b718daf8315d4d45e98dfe4df20f7f5c7e154096
SHA512eb3179ca144c7fc574c58b5e0111c560bd164a6101f2366a913fedc11117702153ddb72927983ee61a993e437f83d03c7587c1a1dd5794acda89d3741a7ac6bb
-
Filesize
597B
MD5201e3bb7045d551283da0fc654703ac5
SHA1d92a75b05b5e982d62585dc778cf84a4d90041d1
SHA25640aef55643edb9bc41f456d8aaf7fdbf40f3e6435ccfadb26f8f47cee3f41130
SHA512d361e0bbfce1823521356899c1be80e3a677180c9aa5ba1ea5a4bdaa81d5fa03b24772bea9b8b49f48ae27920381cecf6f89277387c9563da0c6440a8e0a030f
-
Filesize
597B
MD5047f27c050e4efa7e5e6133a48bfd7fb
SHA1c5c955676519d338ba1dbefebbb7c8f22f01b32f
SHA256061f51e77eac4a235b6120cb2a2bc2fa178c355341ae5b2296be75882deacbb9
SHA5120b8ee8ec3db96485e2f55a6133c0501fc15429d56a79360117152105d508a3dcbffb78feaa4ee173d63ca728e025baaeaecf361a855d6706f44686f1a72635a7
-
Filesize
597B
MD5f6db8e32a6cea1a05c371cf6d036889b
SHA1377632bb33a8a6c3404bd23ed734f9c7dcd9f143
SHA256ddaa4d18669d4b06a75d169599dbc66a7ead1d7cb189497f65e9e7ea280aa184
SHA51224b08b7861bc9093953ec375e99ce2abb2c4e3f64dd75725ccf26a5a9dcbe000d190db366442f62b7ee9fa3f1f76e8b4e4860d1f2a994ace1018927534d4c99c
-
Filesize
597B
MD5aa307ee17423a988dcf5aba204194c7f
SHA1db0564239fc18fb77da056faa86e7037d53b8610
SHA256f1c3d9f228dc7b96b0dc3965e6e5902895695fff8b6a975770108266a564a434
SHA51267e993a59527962b8bbc7f3def17b8f154cbffc96c822e4fcfdf45eefb58a474d9fea17b4797a95a7936df984000095f49c9de84a661b178db58cae0818e512b
-
Filesize
597B
MD57e1bcc0f251e9e824468dacc98a98079
SHA16fd6d841a1af4400e848be337ea4ff11dab84946
SHA2562ed34ad1bcc96e6db24417be9058c634a170a4fdc46a6d9d46adda67ceb51047
SHA51274c0f2a88ddb5eade595acc30262dfb2ca74940374d416a5242822bbd79571e1d92d3bc08c6b90f98708a4b8b9d26ea0288104c55231479bc36f240df82abd9b
-
Filesize
549B
MD51952f10a2b4ae0363f14f469e938ba07
SHA1d40bb7f7f355ae5ef4784bfdc012202931380bbf
SHA256d4734ceffd4b347af20fd3dd6beaae501ec664a2599b01958f7656565ce1e843
SHA512beff1f5916f985e136ac7f081f8910285ac9fa61f16d2dcdfc0fec23dc05c876641b110884d03fbe879b5da057c3d9674d90563d69b2cc42f4a1cd93afe7a781
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e