Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe
-
Size
311KB
-
MD5
5ac5ee380a2c953dbcfb8775d79643b9
-
SHA1
70ce39a71beea0ea3a9b05264dc53bda9842350e
-
SHA256
ff9460e1f512fe522007f82dcec1da7a6186106f4b2833c51de5d873b8986dd4
-
SHA512
e1c6fd5698358abaca9453a10066872f58fcddba2969110d7429d2487fec8f851a18210a738e7e3ff9b01bc593d99a7eb0da888b5b18adc0a47bf9e5523c50e4
-
SSDEEP
6144:fmkdyv1gZnhCD8Y6cvazQpQpljgbz2avSw/5YE:1PZnhCD/6cC5plU2avPF
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2020
http://bostoc.com/upload/
http://qianyoupj.cn/upload/
http://sleoppen.com/upload/
http://stempelbeton.at/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3444 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3136 1976 WerFault.exe 5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exepid process 1976 5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe 1976 5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 3444 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exepid process 1976 5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3444 Token: SeCreatePagefilePrivilege 3444 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3444 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ac5ee380a2c953dbcfb8775d79643b9_JaffaCakes118.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 3682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1976 -ip 19761⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1976-2-0x0000000001850000-0x0000000001859000-memory.dmpFilesize
36KB
-
memory/1976-1-0x00000000019C0000-0x0000000001AC0000-memory.dmpFilesize
1024KB
-
memory/1976-3-0x0000000000400000-0x00000000016C0000-memory.dmpFilesize
18.8MB
-
memory/1976-7-0x0000000000400000-0x00000000016C0000-memory.dmpFilesize
18.8MB
-
memory/3444-4-0x0000000000A90000-0x0000000000AA6000-memory.dmpFilesize
88KB