Overview
overview
7Static
static
7JaffaCakes...d5.exe
windows7-x64
7JaffaCakes...d5.exe
windows10-2004-x64
7$PLUGINSDI...SC.dll
windows7-x64
3$PLUGINSDI...SC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rs.dll
windows7-x64
3$PLUGINSDI...rs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
5$PLUGINSDI...on.dll
windows10-2004-x64
5$PROGRAMFI...er.exe
windows7-x64
3$PROGRAMFI...er.exe
windows10-2004-x64
3$PROGRAMFI...32.dll
windows7-x64
3$PROGRAMFI...32.dll
windows10-2004-x64
3$PROGRAMFI...en.dll
windows7-x64
3$PROGRAMFI...en.dll
windows10-2004-x64
3$PROGRAMFI...ce.exe
windows7-x64
1$PROGRAMFI...ce.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 21:02
Behavioral task
behavioral1
Sample
JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ToolkitOffers.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ToolkitOffers.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/version.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/version.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/SoftwareUpdater/AppsUpdater.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/SoftwareUpdater/AppsUpdater.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/SoftwareUpdater/Interop.Shell32.dll
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/SoftwareUpdater/Interop.Shell32.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
$PROGRAMFILES/SoftwareUpdater/KeyGen.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PROGRAMFILES/SoftwareUpdater/KeyGen.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
$PROGRAMFILES/SoftwareUpdater/UpdaterService.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PROGRAMFILES/SoftwareUpdater/UpdaterService.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe
-
Size
518KB
-
MD5
991cfb1a1d10405409631afc67583fd5
-
SHA1
a5b33924231bbce1284753f910eeae5bc822ca85
-
SHA256
87446a4e1056b7302a7bf9a0d96f62c7dee29180172ca20cbf6e0a5722baaeef
-
SHA512
8d3ce53254075f2450503a49dc081849ca0af5e07aaad193d70176cfc8a82c5e09105b6d9df72b77a786c2869d59f3ab2a0246c37b2f49901a4328265c4535fa
-
SSDEEP
12288:57bItJ8rSLE+aoukeIyc5+h3bznUItJqT1XWc8:570z82LEmMDhbznrzqT1Xd8
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0015000000005587-42.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2080 UpdaterService.exe -
Loads dropped DLL 11 IoCs
pid Process 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/files/0x0015000000005587-42.dat upx -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdaterSem.exe.config JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdater.exe.config JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File created C:\Program Files (x86)\SoftwareUpdater\Interop.Shell32.dll JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File created C:\Program Files (x86)\SoftwareUpdater\KeyGen.dll JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File created C:\Program Files (x86)\SoftwareUpdater\translations.xml JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File opened for modification C:\Program Files (x86)\SoftwareUpdater\AppsUpdaterSem.exe.config JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdater.exe JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe File created C:\Program Files (x86)\SoftwareUpdater\uninstall.exe JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2456 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 taskkill.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 524 wrote to memory of 2456 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 31 PID 524 wrote to memory of 2456 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 31 PID 524 wrote to memory of 2456 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 31 PID 524 wrote to memory of 2456 524 JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_991cfb1a1d10405409631afc67583fd5.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppsUpdater.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe"C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe"1⤵
- Executes dropped EXE
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD54c26cd40c0ce9b443e9d35401b2154ba
SHA17199b4c90cbc3afc9b02f21987cba50cacef3bab
SHA2565f97cc5d8a6d138af535c3c98634d6c7612768bfd3a3ccab7bc5a449570d24b6
SHA512e86505826038e60251a14ba1f4ee93b0fa0f9ed727bf9bf1fd89921ad5d13395296a429c365ce06e5c39483465cec7b4031d627c902dfce3c05d6f5b0c3f883f
-
Filesize
245KB
MD53c6a9490f32cf8aca12252188874dade
SHA14df69fe59c10f2cd6de472e5fc05eed5a489998b
SHA25689ebab8d0675d7b79a3d0a455ec55d0b87aa0804cfd092e30f3d1142f0ce1109
SHA512e8ce3378bb4cfb95cbe5ea0ad83fbf8e129cdfa0e724346b789c3f43c76b8a81d85b1c1b1c1c3fe7de0bf2b00e3c8fe485b2d784d8bbaf2221faa2ce20aa6be5
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f