Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe
-
Size
301KB
-
MD5
7a3e9ae2c054c2f7e8e73cb31afcece8
-
SHA1
b591549262c6bf635399b88a53065a3735c16450
-
SHA256
36a6f4781d52120c705959359957957ff713df14093ebcb3084ca20db40eaaeb
-
SHA512
e074e57456f760c0de0645520232764cd4154460f275567e36a90c66e1707699d54a325fa5448842021d0008e601e4e87564437498860bc29735236b106bc02c
-
SSDEEP
3072:omFSv0+rTSlRJlDjEKqAvPPtzGDgDb2Gk3cvzDlIVZ+HJrU8ZxtQoSznijhnlhI5:cSl391Dvt68Db2rQz+z+HuosoAwhIa
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3404 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4508 1944 WerFault.exe 7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exepid process 1944 7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe 1944 7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 3404 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exepid process 1944 7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3404 Token: SeCreatePagefilePrivilege 3404 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3404 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a3e9ae2c054c2f7e8e73cb31afcece8_JaffaCakes118.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 3682⤵
- Program crash
PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1944 -ip 19441⤵PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1944-1-0x0000000002E20000-0x0000000002F20000-memory.dmpFilesize
1024KB
-
memory/1944-2-0x0000000000400000-0x0000000002DA3000-memory.dmpFilesize
41.6MB
-
memory/1944-3-0x0000000002F30000-0x0000000002F39000-memory.dmpFilesize
36KB
-
memory/1944-7-0x0000000000400000-0x0000000002DA3000-memory.dmpFilesize
41.6MB
-
memory/3404-4-0x0000000002FD0000-0x0000000002FE6000-memory.dmpFilesize
88KB