Overview
overview
7Static
static
75769f613b9...18.exe
windows7-x64
75769f613b9...18.exe
windows10-2004-x64
7$TEMP/FixW....2.exe
windows7-x64
1$TEMP/FixW....2.exe
windows10-2004-x64
1$TEMP/svchost.exe
windows7-x64
7$TEMP/svchost.exe
windows10-2004-x64
7$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3messenger.exe
windows7-x64
3messenger.exe
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7Analysis
-
max time kernel
144s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 12:23
Behavioral task
behavioral1
Sample
5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/FixWin v 1.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/FixWin v 1.2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/svchost.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/svchost.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/md5dll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
messenger.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
messenger.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240903-en
General
-
Target
5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
-
Size
903KB
-
MD5
5769f613b9098795f79b8eedcb864635
-
SHA1
685a7fc226dc4e60daf8011cf92ee0143a65065e
-
SHA256
a333f98a6636503dcf18047486bdd51a67b0addb1014b049362d5d0769f3cb4b
-
SHA512
3f93c2e32895f4e3363a3ba72a5dd0857bac9d984155ece571444cbbc13eef315279dfb84689537a2f13a5e0706f15a44b82764eeb18b3c31d7f2a468d501921
-
SSDEEP
12288:qk1/SPBZESknftnlARVptnjH1AkRRET0ZBT0Z:HSP/knftnlARVptnr1AkvEu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2784 svchost.exe 2788 FixWin v 1.2.exe -
Loads dropped DLL 8 IoCs
pid Process 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 2784 svchost.exe 2784 svchost.exe 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 2784 svchost.exe 2784 svchost.exe 2784 svchost.exe 2784 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\messenger.exe = "C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\Web Components\\messenger.exe" svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\Web Components\messenger.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000d00000001226a-3.dat nsis_installer_1 behavioral1/files/0x000d00000001226a-3.dat nsis_installer_2 behavioral1/files/0x0008000000016aa9-19.dat nsis_installer_1 behavioral1/files/0x0008000000016aa9-19.dat nsis_installer_2 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2784 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2784 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2784 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2784 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2784 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2784 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2784 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2788 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2788 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2788 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 31 PID 2656 wrote to memory of 2788 2656 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 31 PID 2788 wrote to memory of 2016 2788 FixWin v 1.2.exe 32 PID 2788 wrote to memory of 2016 2788 FixWin v 1.2.exe 32 PID 2788 wrote to memory of 2016 2788 FixWin v 1.2.exe 32 PID 2016 wrote to memory of 448 2016 cmd.exe 34 PID 2016 wrote to memory of 448 2016 cmd.exe 34 PID 2016 wrote to memory of 448 2016 cmd.exe 34 PID 2788 wrote to memory of 1376 2788 FixWin v 1.2.exe 35 PID 2788 wrote to memory of 1376 2788 FixWin v 1.2.exe 35 PID 2788 wrote to memory of 1376 2788 FixWin v 1.2.exe 35 PID 1376 wrote to memory of 1228 1376 cmd.exe 37 PID 1376 wrote to memory of 1228 1376 cmd.exe 37 PID 1376 wrote to memory of 1228 1376 cmd.exe 37 PID 2788 wrote to memory of 3060 2788 FixWin v 1.2.exe 38 PID 2788 wrote to memory of 3060 2788 FixWin v 1.2.exe 38 PID 2788 wrote to memory of 3060 2788 FixWin v 1.2.exe 38 PID 3060 wrote to memory of 1692 3060 cmd.exe 40 PID 3060 wrote to memory of 1692 3060 cmd.exe 40 PID 3060 wrote to memory of 1692 3060 cmd.exe 40 PID 2788 wrote to memory of 2896 2788 FixWin v 1.2.exe 41 PID 2788 wrote to memory of 2896 2788 FixWin v 1.2.exe 41 PID 2788 wrote to memory of 2896 2788 FixWin v 1.2.exe 41 PID 2896 wrote to memory of 1772 2896 cmd.exe 43 PID 2896 wrote to memory of 1772 2896 cmd.exe 43 PID 2896 wrote to memory of 1772 2896 cmd.exe 43 PID 2788 wrote to memory of 2644 2788 FixWin v 1.2.exe 44 PID 2788 wrote to memory of 2644 2788 FixWin v 1.2.exe 44 PID 2788 wrote to memory of 2644 2788 FixWin v 1.2.exe 44 PID 2644 wrote to memory of 2616 2644 cmd.exe 46 PID 2644 wrote to memory of 2616 2644 cmd.exe 46 PID 2644 wrote to memory of 2616 2644 cmd.exe 46 PID 2788 wrote to memory of 760 2788 FixWin v 1.2.exe 47 PID 2788 wrote to memory of 760 2788 FixWin v 1.2.exe 47 PID 2788 wrote to memory of 760 2788 FixWin v 1.2.exe 47 PID 760 wrote to memory of 264 760 cmd.exe 49 PID 760 wrote to memory of 264 760 cmd.exe 49 PID 760 wrote to memory of 264 760 cmd.exe 49 PID 2788 wrote to memory of 3052 2788 FixWin v 1.2.exe 50 PID 2788 wrote to memory of 3052 2788 FixWin v 1.2.exe 50 PID 2788 wrote to memory of 3052 2788 FixWin v 1.2.exe 50 PID 3052 wrote to memory of 2328 3052 cmd.exe 52 PID 3052 wrote to memory of 2328 3052 cmd.exe 52 PID 3052 wrote to memory of 2328 3052 cmd.exe 52 PID 2788 wrote to memory of 2964 2788 FixWin v 1.2.exe 53 PID 2788 wrote to memory of 2964 2788 FixWin v 1.2.exe 53 PID 2788 wrote to memory of 2964 2788 FixWin v 1.2.exe 53 PID 2964 wrote to memory of 2144 2964 cmd.exe 55 PID 2964 wrote to memory of 2144 2964 cmd.exe 55 PID 2964 wrote to memory of 2144 2964 cmd.exe 55 PID 2788 wrote to memory of 1608 2788 FixWin v 1.2.exe 56 PID 2788 wrote to memory of 1608 2788 FixWin v 1.2.exe 56 PID 2788 wrote to memory of 1608 2788 FixWin v 1.2.exe 56 PID 1608 wrote to memory of 2156 1608 cmd.exe 58 PID 1608 wrote to memory of 2156 1608 cmd.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe"C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:448
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:1228
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:1692
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:1772
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2616
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:264
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2328
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2144
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2156
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:956
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:1096
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2188
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2512
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1484
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:292
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:856
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2052
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2452
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2508
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1088
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3068
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1708
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2696
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2720
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2664
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2544
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2548
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2712
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2228
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1076
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2084
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2828
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2116
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2872
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2728
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:2864
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e745b649add2a0363e0339a62a77d0d9
SHA14af3f9f46112563e90dd001afa1776b96fa205c7
SHA25673be7f6ed8d8cfa79107e3fd90fdfaac397054ed4ffb64779fdac09aeabd9da6
SHA512e200e2db300566f5161909670b8120c00d1c8e53309cdad7d5a1e380508155552449891c54e70929e700fde9bc1927ea33425cf5d9bed2fe2d8fb91978c9b64d
-
Filesize
529KB
MD5413d07016aba2a424318ebef82ff8a77
SHA12b0dea0d4c65f04eb3f8801b0c1d265effa139a2
SHA25630283bea53bdb8e385af9467c27c45209fc2bc298a76242adf747bf843773d66
SHA5120d8a8c265a882a09f3677cceade583aebd4b3e89996baa3f5413462e383e439adbc0b28c844805cc51f42572b0955a0ed46d001c377b8f40824bb77d4e92b401
-
Filesize
19KB
MD514b848866035dea39b912da628307231
SHA1d00c8963aee8038d8a22f098cef69b31007196e5
SHA2566a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc
SHA5124538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
168KB
MD50c3f735c0cca87b1da6956b216288d1f
SHA19dda74e792329af180d4b4ca8e7bd611e020fa44
SHA2564b4cbdc0ead3480f31b7fb54bad8dd5913f4cf9aaee6b44d349c2e27940ec5e5
SHA5128fd47a669fdc01c1a24a94dada599f2f23a2213daf827b233c180d9ebc6e902261f365423ed4729c8401658d41e97e802f8ebc3e918321394986a0938a65b647