Overview
overview
10Static
static
3JaffaCakes...d8.exe
windows7-x64
7JaffaCakes...d8.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3AIPR.exe
windows7-x64
10AIPR.exe
windows10-2004-x64
10aipr.chm
windows7-x64
1aipr.chm
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 11:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
AIPR.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AIPR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
aipr.chm
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
aipr.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe
-
Size
726KB
-
MD5
e59e6e1081087847cb0b296e491b71d8
-
SHA1
b35cc7dc10ebd75d46d6e66478f17107713a8eb0
-
SHA256
6e341a169924d71f2451a4b76562a14e2d2bdad3d312af72eedbf90e3b7a40e7
-
SHA512
4306ab6ec1b476529f682e6873cbe8bc4ac692d2c1268ea2893b4c3a8198125855251a1cc7e2837c677fdc6c50bb71e6f8e8a0f596ab88609eb9d0baf1287388
-
SSDEEP
12288:hWdAfHjNYxUAWJONMzhzliQDL63eAQo7qDJFIh8UPJK4nDAc+uyT7tR7gGcv97xz:hli+JO2zdDEfQo7oI6K71Jyvngnxz
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4452 JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe 4452 JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e59e6e1081087847cb0b296e491b71d8.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD54c7d97d0786ff08b20d0e8315b5fc3cb
SHA1bb6f475e867b2bf55e4cd214bd4ef68e26d70f6c
SHA25675e20f4c5eb00e9e5cb610273023e9d2c36392fa3b664c264b736c7cc2d1ac84
SHA512f37093fd5cdda74d8f7376c60a05b442f884e9d370347c7c39d84eca88f23fbea6221da2e57197acd78c817a74703c49fb28b89d41c3e34817cc9301b0b6485a
-
Filesize
6KB
MD5388c408cff35a38d04e3cda18f63af07
SHA19c2aa2ed8b526ace4267acbcf5648b2601019ac4
SHA2564f945ad53b7aa8ed516b2f58c2ed9f15c13bbdf0e489d71c7347b80583cee5fd
SHA512542292d61ff209f6c98c62ebad549024611a7d42fb951f8cc211b886f0d202d5e0da3b754c84c8a00043c748ed527351fc524357412cf88875e6bf729cbba46f
-
Filesize
744B
MD52cb0f1a1a1efd672df8cc1481657e8c3
SHA1ad94d0a9edc6cf52cb0937ca1bad7d86c5a53273
SHA256a106570e1f45c205e3dd24751c0b66d96ac85e80d80917a535cfc6f10db87fa2
SHA512396dcb1a6c55c06de8314540cd1a0fbdeebea235ace2bf6244ad60b95e942808fb155f360022fa04c98ab78403630939f50a091bbdab096d36a1d0117d39b2d7