Overview
overview
7Static
static
5JaffaCakes...5c.exe
windows7-x64
7JaffaCakes...5c.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...360.js
windows7-x64
3$PROGRAMFI...360.js
windows10-2004-x64
7$PROGRAMFI.../3.bat
windows7-x64
1$PROGRAMFI.../3.bat
windows10-2004-x64
1$PROGRAMFI.../3.vbs
windows7-x64
3$PROGRAMFI.../3.vbs
windows10-2004-x64
3$PROGRAMFI.../q.vbs
windows7-x64
3$PROGRAMFI.../q.vbs
windows10-2004-x64
3$TEMP/SeFa...01.exe
windows7-x64
6$TEMP/SeFa...01.exe
windows10-2004-x64
6�...��.exe
windows7-x64
6�...��.exe
windows10-2004-x64
6Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 16:30
Behavioral task
behavioral1
Sample
JaffaCakes118_8ad5786bd8973d15d926e4fd2d4d9a5c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8ad5786bd8973d15d926e4fd2d4d9a5c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PROGRAMFILES/NetMeeting/360.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PROGRAMFILES/NetMeeting/360.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/files/3.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/files/3.bat
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/files/3.vbs
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/files/3.vbs
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/files/q.vbs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/files/q.vbs
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
$TEMP/SeFastInstall3_3201.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$TEMP/SeFastInstall3_3201.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
֮.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
֮.exe
Resource
win10v2004-20250314-en
General
-
Target
֮.exe
-
Size
1.4MB
-
MD5
5b09029117dedb91f4b06ef3c0e8b94f
-
SHA1
6cef43f5147d5fe01b66748157782626cce44c28
-
SHA256
4dbc3ae45a04dea291f318cfefdd091af2d6a2a747f4970a1c369752ca093558
-
SHA512
fdd0385a7f094774fb77bec9830c7eb62fa081936c55c91539394421d2b0b8dde8ea7bb84a48001814a1e0b496e741cc5ee5c2ebd905c9ef945e7dbb22e38c32
-
SSDEEP
24576:SRFS7Iid6Nx7izcFsaWrtLTOITQA6kOStpbspT63cGnD:vDd6ziVTOITQAOpT63cGnD
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ֮.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ֮.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ֮.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE ֮.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION ֮.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\֮.exe = "1" ֮.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ֮.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main ֮.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl ֮.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\֮.exe = "0" ֮.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE\֮.exe = "1" ֮.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_INTERNET_SHELL_FOLDERS ֮.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_INTERNET_SHELL_FOLDERS\֮.exe = "0" ֮.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ֮.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT ֮.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2128 ֮.exe 2128 ֮.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\֮.exe"C:\Users\Admin\AppData\Local\Temp\֮.exe"1⤵
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\favicon[1].ico
Filesize1KB
MD57ef1f0a0093460fe46bb691578c07c95
SHA12da3ffbbf4737ce4dae9488359de34034d1ebfbd
SHA2564c62eef22174220b8655590a77b27957f3518b4c3b7352d0b64263b80e728f2c
SHA51268da2c2f6f7a88ae364a4cf776d2c42e50150501ccf9b740a2247885fb21d1becbe9ee0ba61e965dd21d8ee01be2b364a29a7f9032fc6b5cdfb28cc6b42f4793