Analysis
-
max time kernel
159s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe
-
Size
147KB
-
MD5
c4fe05c5529a6167adbf207463cd4b05
-
SHA1
51f88ce763f8322859b2ca0a320ab5c1032cc542
-
SHA256
77881de51211abb4b9882edd8a31737b45c3bc7bb0f33be95dfdad6046f58762
-
SHA512
c31038264fe14672ba29d61e442ddfc234fe9ba18eade98e2680b5e0bea47fe99d4c94ad77bd16d2f3cb66793c0c312a771141d8e8487f91611ad883251f242e
-
SSDEEP
1536:3rb7meUk8lLhiVS2p3A3YLqqd0Mwe+0g0wY5hsnp8k2vh2IPbYAtOglr1AmBmUOh:3rbffGLh2RAoLW1v/YGKCIPRLlricY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 gaado.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 pastebin.com 4 pastebin.com 5 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2544 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2688 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 gaado.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 0f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f0b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f007400000053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c0140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df01d0000000100000010000000918ad43a9475f78bb5243de886d8103c09000000010000000c000000300a06082b06010505070301030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47420000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 gaado.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 gaado.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 gaado.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe 2348 gaado.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe Token: SeDebugPrivilege 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe Token: SeDebugPrivilege 2348 gaado.exe Token: SeDebugPrivilege 2348 gaado.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2660 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 27 PID 2236 wrote to memory of 2660 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 27 PID 2236 wrote to memory of 2660 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 27 PID 2236 wrote to memory of 2668 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2668 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2668 2236 c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe 29 PID 2660 wrote to memory of 2544 2660 cmd.exe 31 PID 2660 wrote to memory of 2544 2660 cmd.exe 31 PID 2660 wrote to memory of 2544 2660 cmd.exe 31 PID 2668 wrote to memory of 2688 2668 cmd.exe 32 PID 2668 wrote to memory of 2688 2668 cmd.exe 32 PID 2668 wrote to memory of 2688 2668 cmd.exe 32 PID 2668 wrote to memory of 2348 2668 cmd.exe 33 PID 2668 wrote to memory of 2348 2668 cmd.exe 33 PID 2668 wrote to memory of 2348 2668 cmd.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c4fe05c5529a6167adbf207463cd4b05_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "gaado" /tr '"C:\Users\Admin\AppData\Roaming\gaado.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "gaado" /tr '"C:\Users\Admin\AppData\Roaming\gaado.exe"'3⤵
- Creates scheduled task(s)
PID:2544
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpC5EE.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2688
-
-
C:\Users\Admin\AppData\Roaming\gaado.exe"C:\Users\Admin\AppData\Roaming\gaado.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
149B
MD54a53fa5b346f779c42039d2ea8a35e69
SHA12d91b56eedeffe31730eff79857a255892c751a8
SHA25673a1915aa36f001a2f7ec15b9e076b8097d470b47f8e84a7b7f5a7827cc03644
SHA512cb63c1767ef4a521bd610ac4e68f922a61ad73d484a3be737683b7ff16288407c9cbd88adee6ebd0c5424327c30369b61bc7c8d5f002f1a97c9ad1c3b95f9faa
-
Filesize
147KB
MD5c4fe05c5529a6167adbf207463cd4b05
SHA151f88ce763f8322859b2ca0a320ab5c1032cc542
SHA25677881de51211abb4b9882edd8a31737b45c3bc7bb0f33be95dfdad6046f58762
SHA512c31038264fe14672ba29d61e442ddfc234fe9ba18eade98e2680b5e0bea47fe99d4c94ad77bd16d2f3cb66793c0c312a771141d8e8487f91611ad883251f242e