Analysis
-
max time kernel
129s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-10-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
731a72c330851c00eddaaab7485e1ab7
-
SHA1
1d915d4b2ff73fd945d7be5015148e8a0a0aa1f4
-
SHA256
5f024533a5a2ae34dd52255157eb1da31519ef8ab852c298e0fc38226d5d4783
-
SHA512
a08b34fc881d2574c886b5c676f0bd862649bb846f54f13592ea3258be95b4ad4559903e0fe83d43c77c69ba28f3ae782d776edec60f227362deebe864c7b521
-
SSDEEP
24576:M/ZwBeJgRh7/tH40tFbeiG7AhHlCGR6dwskBphv7YqokULr8K/GCYYeTY:EM/t7ip6HQGR6d8YqoF/84GCYY
Malware Config
Signatures
-
Executes dropped EXE 16 IoCs
Processes:
14.exe13.exe12.exe11.exe10.exe9.exe8.exe7.exe6.exe5.exe4.exe3.exe2.exe1.exenewest keylogger.exeOKJ.exepid process 1704 14.exe 2888 13.exe 2848 12.exe 2916 11.exe 2740 10.exe 2284 9.exe 2096 8.exe 2988 7.exe 592 6.exe 2560 5.exe 2428 4.exe 956 3.exe 2344 2.exe 2136 1.exe 2532 newest keylogger.exe 768 OKJ.exe -
Loads dropped DLL 64 IoCs
Processes:
731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe14.exe13.exe12.exe11.exe10.exe9.exe8.exe7.exe6.exe5.exe4.exe3.exe2.exepid process 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 1704 14.exe 1704 14.exe 1704 14.exe 1704 14.exe 1704 14.exe 2888 13.exe 2888 13.exe 2888 13.exe 2888 13.exe 2888 13.exe 2848 12.exe 2848 12.exe 2848 12.exe 2848 12.exe 2848 12.exe 2916 11.exe 2916 11.exe 2916 11.exe 2916 11.exe 2916 11.exe 2740 10.exe 2740 10.exe 2740 10.exe 2740 10.exe 2740 10.exe 2284 9.exe 2284 9.exe 2284 9.exe 2284 9.exe 2284 9.exe 2096 8.exe 2096 8.exe 2096 8.exe 2096 8.exe 2096 8.exe 2988 7.exe 2988 7.exe 2988 7.exe 2988 7.exe 2988 7.exe 592 6.exe 592 6.exe 592 6.exe 592 6.exe 592 6.exe 2560 5.exe 2560 5.exe 2560 5.exe 2560 5.exe 2560 5.exe 2428 4.exe 2428 4.exe 2428 4.exe 2428 4.exe 2428 4.exe 956 3.exe 956 3.exe 956 3.exe 956 3.exe 956 3.exe 2344 2.exe 2344 2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
OKJ.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OKJ Start = "C:\\Windows\\SysWOW64\\TGFEPI\\OKJ.exe" OKJ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
Processes:
newest keylogger.exeOKJ.exedescription ioc process File created C:\Windows\SysWOW64\TGFEPI\OKJ.003 newest keylogger.exe File created C:\Windows\SysWOW64\TGFEPI\OKJ.exe newest keylogger.exe File opened for modification C:\Windows\SysWOW64\TGFEPI\ OKJ.exe File created C:\Windows\SysWOW64\TGFEPI\OKJ.004 newest keylogger.exe File created C:\Windows\SysWOW64\TGFEPI\OKJ.001 newest keylogger.exe File created C:\Windows\SysWOW64\TGFEPI\OKJ.002 newest keylogger.exe File created C:\Windows\SysWOW64\TGFEPI\AKV.exe newest keylogger.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
14.exe1.exe731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe13.exe11.exe7.exe6.exe3.exenewest keylogger.exeOKJ.exe4.exe12.exe10.exe9.exe8.exe5.exe2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newest keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OKJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
OKJ.exepid process 768 OKJ.exe 768 OKJ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
OKJ.exedescription pid process Token: 33 768 OKJ.exe Token: SeIncBasePriorityPrivilege 768 OKJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
OKJ.exepid process 768 OKJ.exe 768 OKJ.exe 768 OKJ.exe 768 OKJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe14.exe13.exe12.exe11.exe10.exe9.exe8.exe7.exe6.exedescription pid process target process PID 2336 wrote to memory of 1704 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 14.exe PID 2336 wrote to memory of 1704 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 14.exe PID 2336 wrote to memory of 1704 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 14.exe PID 2336 wrote to memory of 1704 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 14.exe PID 2336 wrote to memory of 1704 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 14.exe PID 2336 wrote to memory of 1704 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 14.exe PID 2336 wrote to memory of 1704 2336 731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe 14.exe PID 1704 wrote to memory of 2888 1704 14.exe 13.exe PID 1704 wrote to memory of 2888 1704 14.exe 13.exe PID 1704 wrote to memory of 2888 1704 14.exe 13.exe PID 1704 wrote to memory of 2888 1704 14.exe 13.exe PID 1704 wrote to memory of 2888 1704 14.exe 13.exe PID 1704 wrote to memory of 2888 1704 14.exe 13.exe PID 1704 wrote to memory of 2888 1704 14.exe 13.exe PID 2888 wrote to memory of 2848 2888 13.exe 12.exe PID 2888 wrote to memory of 2848 2888 13.exe 12.exe PID 2888 wrote to memory of 2848 2888 13.exe 12.exe PID 2888 wrote to memory of 2848 2888 13.exe 12.exe PID 2888 wrote to memory of 2848 2888 13.exe 12.exe PID 2888 wrote to memory of 2848 2888 13.exe 12.exe PID 2888 wrote to memory of 2848 2888 13.exe 12.exe PID 2848 wrote to memory of 2916 2848 12.exe 11.exe PID 2848 wrote to memory of 2916 2848 12.exe 11.exe PID 2848 wrote to memory of 2916 2848 12.exe 11.exe PID 2848 wrote to memory of 2916 2848 12.exe 11.exe PID 2848 wrote to memory of 2916 2848 12.exe 11.exe PID 2848 wrote to memory of 2916 2848 12.exe 11.exe PID 2848 wrote to memory of 2916 2848 12.exe 11.exe PID 2916 wrote to memory of 2740 2916 11.exe 10.exe PID 2916 wrote to memory of 2740 2916 11.exe 10.exe PID 2916 wrote to memory of 2740 2916 11.exe 10.exe PID 2916 wrote to memory of 2740 2916 11.exe 10.exe PID 2916 wrote to memory of 2740 2916 11.exe 10.exe PID 2916 wrote to memory of 2740 2916 11.exe 10.exe PID 2916 wrote to memory of 2740 2916 11.exe 10.exe PID 2740 wrote to memory of 2284 2740 10.exe 9.exe PID 2740 wrote to memory of 2284 2740 10.exe 9.exe PID 2740 wrote to memory of 2284 2740 10.exe 9.exe PID 2740 wrote to memory of 2284 2740 10.exe 9.exe PID 2740 wrote to memory of 2284 2740 10.exe 9.exe PID 2740 wrote to memory of 2284 2740 10.exe 9.exe PID 2740 wrote to memory of 2284 2740 10.exe 9.exe PID 2284 wrote to memory of 2096 2284 9.exe 8.exe PID 2284 wrote to memory of 2096 2284 9.exe 8.exe PID 2284 wrote to memory of 2096 2284 9.exe 8.exe PID 2284 wrote to memory of 2096 2284 9.exe 8.exe PID 2284 wrote to memory of 2096 2284 9.exe 8.exe PID 2284 wrote to memory of 2096 2284 9.exe 8.exe PID 2284 wrote to memory of 2096 2284 9.exe 8.exe PID 2096 wrote to memory of 2988 2096 8.exe 7.exe PID 2096 wrote to memory of 2988 2096 8.exe 7.exe PID 2096 wrote to memory of 2988 2096 8.exe 7.exe PID 2096 wrote to memory of 2988 2096 8.exe 7.exe PID 2096 wrote to memory of 2988 2096 8.exe 7.exe PID 2096 wrote to memory of 2988 2096 8.exe 7.exe PID 2096 wrote to memory of 2988 2096 8.exe 7.exe PID 2988 wrote to memory of 592 2988 7.exe 6.exe PID 2988 wrote to memory of 592 2988 7.exe 6.exe PID 2988 wrote to memory of 592 2988 7.exe 6.exe PID 2988 wrote to memory of 592 2988 7.exe 6.exe PID 2988 wrote to memory of 592 2988 7.exe 6.exe PID 2988 wrote to memory of 592 2988 7.exe 6.exe PID 2988 wrote to memory of 592 2988 7.exe 6.exe PID 592 wrote to memory of 2560 592 6.exe 5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\731a72c330851c00eddaaab7485e1ab7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\14.exe"C:\Users\Admin\AppData\Local\Temp\14.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\13.exe"C:\Users\Admin\AppData\Local\Temp\13.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\9.exe"C:\Users\Admin\AppData\Local\Temp\9.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:956 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\newest keylogger.exe"C:\Users\Admin\AppData\Local\Temp\newest keylogger.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\SysWOW64\TGFEPI\OKJ.exe"C:\Windows\system32\TGFEPI\OKJ.exe"17⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD510b57df1591d237e3fcc5015544bfa80
SHA1746c92af65c434ce4b0376293f026b4e22e54223
SHA25678e63304544052b6ac499587064da764351d04b1c8a3070e9d28f308e29ff630
SHA5122f648bd5207d356e278e85525467e552b36f874757fac28a9424140942ce26a8926deb2a8d2d7fb2b4216f0a1a059154893964a9033a6bfa4a3cbb56c691dba6
-
Filesize
1.4MB
MD55ca640fe3769a2f1bfe215671c9845ec
SHA1d5ed3e19e5989ca70266ba577aa701e6134a175a
SHA256fda13669ef8d83312943bf5950222329c4bec38724f49a61e67ec452041e4b53
SHA512ceeea7fa08a6fed9495018dfb4f7adeca138f84ae3397f6f2bd9d01f7133102f44c8725a2fa72f442e566b4f289278fde9c808b09098056396ac8a4296f90d77
-
Filesize
1.4MB
MD53a925270bf9609d45a2b4df97e221057
SHA17cffb8b41181bc11f4ba8a004ba46b2a6b0bf915
SHA25678a99ba1618fcb648b3ea18867e4ec5e00b32a79081252c5bcd3d2894b148519
SHA512db79b1d573d46a4b50ff39915a766224d37ca9dba886d71e5916300a4ed3329f0ba68606eca211fb131a4826a85a053138adb165bf2b051050886d454e2421a4
-
Filesize
1.4MB
MD5a92f43305031e90ca4f5f4e4934184e5
SHA144e3ae161bb6a04939b2f8863abda964a624b474
SHA25639cc23a60a887c3aef044438ca1e2fc409a6510ab366741f9e6e2a75daa55adf
SHA51254d63286d90482d8cdb8571f5cd907e8ef08835d9a7e7f030a03aa5d6bc90439436cdd3865cb12ea0f3d129da6bbec97a573eaec348883832496c2dd03cf9220
-
Filesize
1.5MB
MD53de6849144e5efbf50d4e0cf121c0948
SHA1b31182d4f8293e771e5297ba6eadd4a7aa85bf7a
SHA256eba2065f5758f32da2967c4dcbd1dfe9ceefe98de0ae037e94d1e20deaa4afea
SHA51281b095fa5c1bd4466064dffcc8a2db75f5d6d5bcbf021d6a407461ae0e416fd0caa452e7c3efdd5b60eac8a53f531aaf553a13509443325db00c149d90933ce6
-
Filesize
1.5MB
MD5b2d3d71c66396b7c29a1df9da1bc3ebe
SHA18bf4bf4683af44c6e5e9b0f35b8fd02c1eda5a6e
SHA2568ad5cf0e0d958123ff47d866d7e6b8a16cc64bccc019e27b8befa5d77139fbcc
SHA51234f87807720cabf4a74b8609985f637da41e61a65894d9806de5884496b6c79e4d0956d19bf19efecb61da29db93bafdc373d5e079a4479aec9eeb831a8f38a7
-
Filesize
1.3MB
MD5484ecf89540746869807f45148a2f2e5
SHA1407e9242c74cf6d206ced86935ebe3a398ca9a38
SHA256eb9ded3cea62d3f5f994b3ff1f93c261859d20ccd82e324d269c81b0d43a0f70
SHA5123de402ca92d265331bc6445e1d8e0c48b29af91fc4a433e7ec5af1c16e081ab9a677aa51dfea2014163f5c3c20afb2e4941cdfadf6772fcfbdb920e96492c062
-
Filesize
1.3MB
MD541c3b7ce9fa12290b6d3e23f6782d86d
SHA1b389afe59b59d7a15e7ed53f642ac098c1108242
SHA256fd32899eed87b2da5c2eb071ac673097e4608a54fb0e612f1271efe782365b4f
SHA51209fc2afdb3ff084ed27557dbe6ed1ef1f034c9065ed609cd00aef738e3acef79cdbfe147253ec9034a5a9ae6c31aa1629cb1c4c99a689332369799afebd96d73
-
Filesize
1.4MB
MD5e850c0929b3ee67fa81ba6e13b2d001d
SHA1dccec3171a4dab04c0f7e99ece55038c19ffe0dd
SHA25669a47188c35cab062d0b07c965e7c49613827c42788c4fe89f821735cdae35f3
SHA51260a62106412dd821dfa97efbab8051578764a44f665b6db463496fd7942289428fd1084c297d5b1bb0f1d24c2828067c80451c478a8a4552620ce7ab06f4b259
-
Filesize
1.4MB
MD520e965b046fadf039f7f1234e06bde40
SHA1353e0b2c7fff94667a1d7ba899a2fee8a7282e6a
SHA2565c42a1bf9934333991bb3ae3c555fd7fdb5548816e53ce58db19475f7738e04a
SHA512c06e2cc9924a3f47431eda60544e7a7a7d66d2a48f46e8706e35c420651c216194dd08a2716e116e07ad8cc5a14dd2f49740191ca01a984501106a04e8cfcdcd