Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe
-
Size
7.9MB
-
MD5
0e4f1adeeac0fc089862460ae64d3e80
-
SHA1
07d73a542dd291bbf669a9ee23c89b66de1c0a66
-
SHA256
b2c1fc090a50ea481d02988e1e07b704b1a2d909821c0ec12c63599c2cb6198a
-
SHA512
cf995feb2a1067584985674f7457d4433ca40512d7d6346cbeaa0c8468d671d0f1a31d8c4b57d4de02b841017a2014038d036da3040046764444741e5a803c8a
-
SSDEEP
196608:8lazg7DSmlazg7DSmlazg7DSmlazg7DSN:Fg7u3g7u3g7u3g7uN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2632 7D57AD13E21.exe 2504 Scegli_nome_allegato.exe 1280 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2632 set thread context of 1280 2632 7D57AD13E21.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2316 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2504 Scegli_nome_allegato.exe 2504 Scegli_nome_allegato.exe 2504 Scegli_nome_allegato.exe 1280 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2316 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2316 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2316 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2316 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 28 PID 2004 wrote to memory of 2632 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 30 PID 2004 wrote to memory of 2632 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 30 PID 2004 wrote to memory of 2632 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 30 PID 2004 wrote to memory of 2632 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 30 PID 2004 wrote to memory of 2504 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 32 PID 2004 wrote to memory of 2504 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 32 PID 2004 wrote to memory of 2504 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 32 PID 2004 wrote to memory of 2504 2004 0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe 32 PID 2632 wrote to memory of 1280 2632 7D57AD13E21.exe 35 PID 2632 wrote to memory of 1280 2632 7D57AD13E21.exe 35 PID 2632 wrote to memory of 1280 2632 7D57AD13E21.exe 35 PID 2632 wrote to memory of 1280 2632 7D57AD13E21.exe 35 PID 2632 wrote to memory of 1280 2632 7D57AD13E21.exe 35 PID 2632 wrote to memory of 1280 2632 7D57AD13E21.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e4f1adeeac0fc089862460ae64d3e80_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2316
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD58fe242442e9ecaa6cc89dd958eff8863
SHA10884f0f558c6bc62cc7d19e9b1c35857eb5a0713
SHA256fedbe9aadbddbd1280eff6e8c697cd032feb0ea7488bb13e7675124399c3c1db
SHA512448e221522460dd2bca6a2437f85f11ad40a4e9e3964f664d1119269f1108c855226e18139add3649fbbd788953afd16174dc32352675e3aea8642e52e49833e
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad