Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 19:14

General

  • Target

    JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe

  • Size

    496KB

  • MD5

    8aefd589efeb7ceb795ca6cc58f9bf20

  • SHA1

    35bb5e50341d3a72e82e996388c89bbaa9d2efbb

  • SHA256

    2e3a7739fd9eb2e6bb2f7747918a025e1bbcd3f8c9fd952d0e4a879992084c9c

  • SHA512

    d33a443f385345c1659b1e2a2080a9eaf8140117641a03cda7b0ec63ef004ea995fca0fc44b45768ead44ca080f31435aec29a9978c562e061e6ac9d1f03eee0

  • SSDEEP

    12288:FmkbnVZIeNyo1BoGJHKnJFgaXdqu3U8OEtOM2ZNtTird:YqbIeNyos4KnJF1XM8OEtOnTEd

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aefd589efeb7ceb795ca6cc58f9bf20.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2356
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2928
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe

      Filesize

      785KB

      MD5

      1f4759ec8dc50429ce7127aa292100ae

      SHA1

      c6583bf92638defbbd915689e5c5782014b0cf7f

      SHA256

      2da9359008415a0543c02c744b2dadaeb98f5b356755c0bda9e86317df1e40cc

      SHA512

      3bfcae9241244b655cee125707cbfe13388d4b86bdcc747303b5048d2a19a8f058c3d1192524133048f988553d6c5ae3294f49361f12a535a1b05ecd891298fb

    • memory/1240-4-0x0000000000160000-0x0000000000161000-memory.dmp

      Filesize

      4KB

    • memory/1240-14-0x0000000000430000-0x0000000000431000-memory.dmp

      Filesize

      4KB

    • memory/1240-13-0x0000000000400000-0x0000000000401000-memory.dmp

      Filesize

      4KB

    • memory/1240-12-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/1240-9-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/1240-8-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/1240-7-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/1240-6-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/1240-0-0x0000000001000000-0x00000000010E2000-memory.dmp

      Filesize

      904KB

    • memory/1240-5-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/1240-1-0x0000000000230000-0x0000000000273000-memory.dmp

      Filesize

      268KB

    • memory/1240-2-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/1240-3-0x0000000000170000-0x0000000000171000-memory.dmp

      Filesize

      4KB

    • memory/1240-32-0x0000000000230000-0x0000000000273000-memory.dmp

      Filesize

      268KB

    • memory/1240-31-0x0000000001000000-0x00000000010E2000-memory.dmp

      Filesize

      904KB

    • memory/2268-49-0x00000000028C0000-0x00000000028D0000-memory.dmp

      Filesize

      64KB

    • memory/2356-30-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/2356-22-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/2496-27-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/2496-33-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB