Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 04:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe
-
Size
124KB
-
MD5
46a31b5fa0c31231de193f2bc26a7a60
-
SHA1
12e819e8a446bf62be99a0848120d6c0c0afcc10
-
SHA256
afc3c324b2c1f4133957f2f35e9f0fd99c33b389b22a5a4d9737125e5f64cb99
-
SHA512
161888b94dd89c9d05a2717d4589a520a2cc3d2d358ec1e3b56de01f039043a18b8ec7322acea75ef27e06fa1b5465b6029e25101b464831be3e15eeab9ec100
-
SSDEEP
1536:jooidHqV3Uk9qnxhLjkap1i/xw1S+sSkAicQmtlI+7Z9Kw+GCFW7z:W5OUh3XNUNjzmtlI+3KjGC2
Malware Config
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2920-11-0x0000000001110000-0x0000000001119000-memory.dmp family_bdaejec_backdoor behavioral1/memory/2920-40-0x0000000001110000-0x0000000001119000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x0009000000012117-10.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2920 yJFwvP.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 2336 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe yJFwvP.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe yJFwvP.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE yJFwvP.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE yJFwvP.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE yJFwvP.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe yJFwvP.exe File opened for modification C:\Program Files\7-Zip\7z.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe yJFwvP.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe yJFwvP.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe yJFwvP.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{FC37790F-E395-416A-A1A1-53BC987E89B4}\chrome_installer.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE yJFwvP.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe yJFwvP.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe yJFwvP.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE yJFwvP.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE yJFwvP.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE yJFwvP.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe yJFwvP.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe yJFwvP.exe File opened for modification C:\Program Files\ReadBlock.exe yJFwvP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yJFwvP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2920 2336 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 31 PID 2336 wrote to memory of 2920 2336 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 31 PID 2336 wrote to memory of 2920 2336 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 31 PID 2336 wrote to memory of 2920 2336 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 31 PID 2920 wrote to memory of 2640 2920 yJFwvP.exe 33 PID 2920 wrote to memory of 2640 2920 yJFwvP.exe 33 PID 2920 wrote to memory of 2640 2920 yJFwvP.exe 33 PID 2920 wrote to memory of 2640 2920 yJFwvP.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\yJFwvP.exeC:\Users\Admin\AppData\Local\Temp\yJFwvP.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5be75019.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD5e70ae6f295825d9909e5b55a017e6b07
SHA120bde0c4a6d5d83ade8a95b902dfdcaec6460daa
SHA256fb5805e96d9b42705e8dfa488ba3e29452de6083874b8ecec308ff539aad9c81
SHA512bcb909f3803e128f3db60bcef78eb1702362e2826725a1f20e5e7b705ce769d35cdd824e6b96861f76ad9966f26ce0ebcc8caa848496e161350d013b952b53f9
-
Filesize
15KB
MD5062bf193aeca7ca42a10f1a2d99fb1ce
SHA11f743d078225f6d1af5b3ec1284e65c50609c0a1
SHA2562554d12416de575e160eb12e75afdb39996eb81101086c2a923bd15e1aab8c6c
SHA512aa9364790d7546522f288bebcd111a00e488a0d01bad55d648fe27c2df11ecb740906efb1ef8b285cb7fda67b09156c3a4e5fb62a1a6107862eb25970506359e