Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-03-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe
-
Size
311KB
-
MD5
3a7ac1ac60baac512bf45e412aacb90c
-
SHA1
d579493a2190a8f6f44a9094148a494c5368cdc7
-
SHA256
5c88ec7f348d5b457a2f155bbd9b0353c1cb840e0e971013c0ebc58aaee3b715
-
SHA512
08c3a3861a092eb7e39f6aa7255b36e2bf54b1f7a15b7fb76ac5f94269e7879e3a27187af2ee11f7215f5796e35ecd9146d04744ab4a4e01fb29a137589963b9
-
SSDEEP
6144:mLVf3fw4e0wZ4EJjz9QkLOfIf/Hp9hLVxCygVM:4IjZZ4IH9QkOfIfPhJxC9
Malware Config
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1192 -
Executes dropped EXE 2 IoCs
Processes:
afbcsagafbcsagpid process 2460 afbcsag 2444 afbcsag -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exeafbcsagdescription pid process target process PID 1152 set thread context of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 2460 set thread context of 2444 2460 afbcsag afbcsag -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exeafbcsagdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI afbcsag Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI afbcsag Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI afbcsag -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exepid process 2240 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 2240 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 1192 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exeafbcsagpid process 2240 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 2444 afbcsag -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exetaskeng.exeafbcsagdescription pid process target process PID 1152 wrote to memory of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1152 wrote to memory of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1152 wrote to memory of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1152 wrote to memory of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1152 wrote to memory of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1152 wrote to memory of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1152 wrote to memory of 2240 1152 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 2396 wrote to memory of 2460 2396 taskeng.exe afbcsag PID 2396 wrote to memory of 2460 2396 taskeng.exe afbcsag PID 2396 wrote to memory of 2460 2396 taskeng.exe afbcsag PID 2396 wrote to memory of 2460 2396 taskeng.exe afbcsag PID 2460 wrote to memory of 2444 2460 afbcsag afbcsag PID 2460 wrote to memory of 2444 2460 afbcsag afbcsag PID 2460 wrote to memory of 2444 2460 afbcsag afbcsag PID 2460 wrote to memory of 2444 2460 afbcsag afbcsag PID 2460 wrote to memory of 2444 2460 afbcsag afbcsag PID 2460 wrote to memory of 2444 2460 afbcsag afbcsag PID 2460 wrote to memory of 2444 2460 afbcsag afbcsag
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2240
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {95094363-25C4-43C5-A286-FBA4A0983B79} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\afbcsagC:\Users\Admin\AppData\Roaming\afbcsag2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Roaming\afbcsagC:\Users\Admin\AppData\Roaming\afbcsag3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311KB
MD53a7ac1ac60baac512bf45e412aacb90c
SHA1d579493a2190a8f6f44a9094148a494c5368cdc7
SHA2565c88ec7f348d5b457a2f155bbd9b0353c1cb840e0e971013c0ebc58aaee3b715
SHA51208c3a3861a092eb7e39f6aa7255b36e2bf54b1f7a15b7fb76ac5f94269e7879e3a27187af2ee11f7215f5796e35ecd9146d04744ab4a4e01fb29a137589963b9