Overview
overview
7Static
static
75769f613b9...18.exe
windows7-x64
75769f613b9...18.exe
windows10-2004-x64
7$TEMP/FixW....2.exe
windows7-x64
1$TEMP/FixW....2.exe
windows10-2004-x64
1$TEMP/svchost.exe
windows7-x64
7$TEMP/svchost.exe
windows10-2004-x64
7$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3messenger.exe
windows7-x64
3messenger.exe
windows10-2004-x64
3$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...ll.dll
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:23
Behavioral task
behavioral1
Sample
5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/FixWin v 1.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/FixWin v 1.2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/svchost.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/svchost.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/md5dll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
messenger.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
messenger.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20240903-en
General
-
Target
5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe
-
Size
903KB
-
MD5
5769f613b9098795f79b8eedcb864635
-
SHA1
685a7fc226dc4e60daf8011cf92ee0143a65065e
-
SHA256
a333f98a6636503dcf18047486bdd51a67b0addb1014b049362d5d0769f3cb4b
-
SHA512
3f93c2e32895f4e3363a3ba72a5dd0857bac9d984155ece571444cbbc13eef315279dfb84689537a2f13a5e0706f15a44b82764eeb18b3c31d7f2a468d501921
-
SSDEEP
12288:qk1/SPBZESknftnlARVptnjH1AkRRET0ZBT0Z:HSP/knftnlARVptnr1AkvEu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3568 svchost.exe 3656 FixWin v 1.2.exe -
Loads dropped DLL 7 IoCs
pid Process 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe 3568 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\messenger.exe = "C:\\Program Files (x86)\\Common Files\\Microsoft Shared\\Web Components\\messenger.exe" svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\Web Components\messenger.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Web Components\messenger.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000d000000023b1d-4.dat nsis_installer_1 behavioral2/files/0x000d000000023b1d-4.dat nsis_installer_2 behavioral2/files/0x000b000000023b82-18.dat nsis_installer_1 behavioral2/files/0x000b000000023b82-18.dat nsis_installer_2 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3568 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3568 3572 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 84 PID 3572 wrote to memory of 3568 3572 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 84 PID 3572 wrote to memory of 3568 3572 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 84 PID 3572 wrote to memory of 3656 3572 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 85 PID 3572 wrote to memory of 3656 3572 5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe 85 PID 3656 wrote to memory of 5092 3656 FixWin v 1.2.exe 93 PID 3656 wrote to memory of 5092 3656 FixWin v 1.2.exe 93 PID 5092 wrote to memory of 216 5092 cmd.exe 95 PID 5092 wrote to memory of 216 5092 cmd.exe 95 PID 3656 wrote to memory of 4588 3656 FixWin v 1.2.exe 100 PID 3656 wrote to memory of 4588 3656 FixWin v 1.2.exe 100 PID 4588 wrote to memory of 4504 4588 cmd.exe 102 PID 4588 wrote to memory of 4504 4588 cmd.exe 102 PID 3656 wrote to memory of 2292 3656 FixWin v 1.2.exe 106 PID 3656 wrote to memory of 2292 3656 FixWin v 1.2.exe 106 PID 2292 wrote to memory of 3372 2292 cmd.exe 108 PID 2292 wrote to memory of 3372 2292 cmd.exe 108 PID 3656 wrote to memory of 1360 3656 FixWin v 1.2.exe 109 PID 3656 wrote to memory of 1360 3656 FixWin v 1.2.exe 109 PID 1360 wrote to memory of 3900 1360 cmd.exe 111 PID 1360 wrote to memory of 3900 1360 cmd.exe 111 PID 3656 wrote to memory of 1796 3656 FixWin v 1.2.exe 114 PID 3656 wrote to memory of 1796 3656 FixWin v 1.2.exe 114 PID 1796 wrote to memory of 3020 1796 cmd.exe 116 PID 1796 wrote to memory of 3020 1796 cmd.exe 116 PID 3656 wrote to memory of 2152 3656 FixWin v 1.2.exe 118 PID 3656 wrote to memory of 2152 3656 FixWin v 1.2.exe 118 PID 2152 wrote to memory of 2944 2152 cmd.exe 120 PID 2152 wrote to memory of 2944 2152 cmd.exe 120 PID 3656 wrote to memory of 2720 3656 FixWin v 1.2.exe 121 PID 3656 wrote to memory of 2720 3656 FixWin v 1.2.exe 121 PID 2720 wrote to memory of 4832 2720 cmd.exe 123 PID 2720 wrote to memory of 4832 2720 cmd.exe 123 PID 3656 wrote to memory of 4008 3656 FixWin v 1.2.exe 124 PID 3656 wrote to memory of 4008 3656 FixWin v 1.2.exe 124 PID 4008 wrote to memory of 916 4008 cmd.exe 126 PID 4008 wrote to memory of 916 4008 cmd.exe 126 PID 3656 wrote to memory of 3800 3656 FixWin v 1.2.exe 127 PID 3656 wrote to memory of 3800 3656 FixWin v 1.2.exe 127 PID 3800 wrote to memory of 2972 3800 cmd.exe 129 PID 3800 wrote to memory of 2972 3800 cmd.exe 129 PID 3656 wrote to memory of 3844 3656 FixWin v 1.2.exe 130 PID 3656 wrote to memory of 3844 3656 FixWin v 1.2.exe 130 PID 3844 wrote to memory of 556 3844 cmd.exe 132 PID 3844 wrote to memory of 556 3844 cmd.exe 132 PID 3656 wrote to memory of 2992 3656 FixWin v 1.2.exe 133 PID 3656 wrote to memory of 2992 3656 FixWin v 1.2.exe 133 PID 2992 wrote to memory of 1284 2992 cmd.exe 135 PID 2992 wrote to memory of 1284 2992 cmd.exe 135 PID 3656 wrote to memory of 2140 3656 FixWin v 1.2.exe 137 PID 3656 wrote to memory of 2140 3656 FixWin v 1.2.exe 137 PID 2140 wrote to memory of 3892 2140 cmd.exe 139 PID 2140 wrote to memory of 3892 2140 cmd.exe 139 PID 3656 wrote to memory of 4704 3656 FixWin v 1.2.exe 140 PID 3656 wrote to memory of 4704 3656 FixWin v 1.2.exe 140 PID 4704 wrote to memory of 4972 4704 cmd.exe 142 PID 4704 wrote to memory of 4972 4704 cmd.exe 142 PID 3656 wrote to memory of 3636 3656 FixWin v 1.2.exe 143 PID 3656 wrote to memory of 3636 3656 FixWin v 1.2.exe 143 PID 3636 wrote to memory of 2904 3636 cmd.exe 145 PID 3636 wrote to memory of 2904 3636 cmd.exe 145 PID 3656 wrote to memory of 2440 3656 FixWin v 1.2.exe 146 PID 3656 wrote to memory of 2440 3656 FixWin v 1.2.exe 146 PID 2440 wrote to memory of 440 2440 cmd.exe 148
Processes
-
C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5769f613b9098795f79b8eedcb864635_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe"C:\Users\Admin\AppData\Local\Temp\FixWin v 1.2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:216
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:4504
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3372
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3900
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3020
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2944
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:4832
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:916
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2972
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:556
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:1284
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3892
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:4972
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2904
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:440
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1768
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2496
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:632
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3180
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1864
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:1812
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:4372
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3484
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:164
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:3988
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1260
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2420
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:4464
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:4324
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:1752
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:608
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /csfc /scannow3⤵PID:4824
-
C:\Windows\system32\sfc.exesfc /scannow4⤵PID:2124
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD5413d07016aba2a424318ebef82ff8a77
SHA12b0dea0d4c65f04eb3f8801b0c1d265effa139a2
SHA25630283bea53bdb8e385af9467c27c45209fc2bc298a76242adf747bf843773d66
SHA5120d8a8c265a882a09f3677cceade583aebd4b3e89996baa3f5413462e383e439adbc0b28c844805cc51f42572b0955a0ed46d001c377b8f40824bb77d4e92b401
-
Filesize
19KB
MD514b848866035dea39b912da628307231
SHA1d00c8963aee8038d8a22f098cef69b31007196e5
SHA2566a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc
SHA5124538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
168KB
MD50c3f735c0cca87b1da6956b216288d1f
SHA19dda74e792329af180d4b4ca8e7bd611e020fa44
SHA2564b4cbdc0ead3480f31b7fb54bad8dd5913f4cf9aaee6b44d349c2e27940ec5e5
SHA5128fd47a669fdc01c1a24a94dada599f2f23a2213daf827b233c180d9ebc6e902261f365423ed4729c8401658d41e97e802f8ebc3e918321394986a0938a65b647
-
Filesize
91KB
MD5e745b649add2a0363e0339a62a77d0d9
SHA14af3f9f46112563e90dd001afa1776b96fa205c7
SHA25673be7f6ed8d8cfa79107e3fd90fdfaac397054ed4ffb64779fdac09aeabd9da6
SHA512e200e2db300566f5161909670b8120c00d1c8e53309cdad7d5a1e380508155552449891c54e70929e700fde9bc1927ea33425cf5d9bed2fe2d8fb91978c9b64d