Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 04:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe
-
Size
124KB
-
MD5
46a31b5fa0c31231de193f2bc26a7a60
-
SHA1
12e819e8a446bf62be99a0848120d6c0c0afcc10
-
SHA256
afc3c324b2c1f4133957f2f35e9f0fd99c33b389b22a5a4d9737125e5f64cb99
-
SHA512
161888b94dd89c9d05a2717d4589a520a2cc3d2d358ec1e3b56de01f039043a18b8ec7322acea75ef27e06fa1b5465b6029e25101b464831be3e15eeab9ec100
-
SSDEEP
1536:jooidHqV3Uk9qnxhLjkap1i/xw1S+sSkAicQmtlI+7Z9Kw+GCFW7z:W5OUh3XNUNjzmtlI+3KjGC2
Malware Config
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/3864-33-0x0000000000850000-0x0000000000859000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x0008000000023c79-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation yJFwvP.exe -
Executes dropped EXE 1 IoCs
pid Process 3864 yJFwvP.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE yJFwvP.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE yJFwvP.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE yJFwvP.exe File opened for modification C:\Program Files\7-Zip\7z.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe yJFwvP.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe yJFwvP.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE yJFwvP.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe yJFwvP.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe yJFwvP.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE yJFwvP.exe File opened for modification C:\Program Files\Windows Mail\wab.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe yJFwvP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe yJFwvP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe yJFwvP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe yJFwvP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yJFwvP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3864 4460 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 84 PID 4460 wrote to memory of 3864 4460 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 84 PID 4460 wrote to memory of 3864 4460 JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe 84 PID 3864 wrote to memory of 4064 3864 yJFwvP.exe 85 PID 3864 wrote to memory of 4064 3864 yJFwvP.exe 85 PID 3864 wrote to memory of 4064 3864 yJFwvP.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46a31b5fa0c31231de193f2bc26a7a60.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\yJFwvP.exeC:\Users\Admin\AppData\Local\Temp\yJFwvP.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\026c288a.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
187B
MD5ab6c8768108f8981f404e6ee37312f2e
SHA17e00f4a3e8b899ae62152bf8ba20570b2c109d2d
SHA2561a6253c3d60c93dab195108db2945cfb83059c1945c73ea6f1dcdc3c042d0b6a
SHA512d23872421fc04e91966753a5ea1c1717d8ab4a945151b9a826f237ef489b53862a3ea163f0974d2edeca967d082e82230e217b5a4d372552852a2cea806109a6
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
15KB
MD5062bf193aeca7ca42a10f1a2d99fb1ce
SHA11f743d078225f6d1af5b3ec1284e65c50609c0a1
SHA2562554d12416de575e160eb12e75afdb39996eb81101086c2a923bd15e1aab8c6c
SHA512aa9364790d7546522f288bebcd111a00e488a0d01bad55d648fe27c2df11ecb740906efb1ef8b285cb7fda67b09156c3a4e5fb62a1a6107862eb25970506359e