Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe
-
Size
15.9MB
-
MD5
c24ee8097f44144666812fd4680e86b2
-
SHA1
63e31ed6836d61dc5938a7d7c38935e11a0356f5
-
SHA256
c996e6a7c750b73478950f4ecec6a40b70ab8d6d8a28cc1608817476bed677b8
-
SHA512
242502ccf7c244909337d83433512d6945a287ce8137ca9287d776358c76a52e67c71caadd84f7adfca7d6046a0d21a56151a34e630c6d52178c744c3822d234
-
SSDEEP
393216:Jg7ubg7ubg7ubg7ubg7ubg7ubg7ubg7uN:KSsSsSsSsSsSsSsSN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2672 7D57AD13E21.exe 3020 Scegli_nome_allegato.exe 1452 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 1452 2672 7D57AD13E21.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2576 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3020 Scegli_nome_allegato.exe 3020 Scegli_nome_allegato.exe 3020 Scegli_nome_allegato.exe 1452 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2576 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 28 PID 2144 wrote to memory of 2576 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 28 PID 2144 wrote to memory of 2576 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 28 PID 2144 wrote to memory of 2576 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 28 PID 2144 wrote to memory of 2672 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 30 PID 2144 wrote to memory of 2672 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 30 PID 2144 wrote to memory of 2672 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 30 PID 2144 wrote to memory of 2672 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 30 PID 2144 wrote to memory of 3020 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 31 PID 2144 wrote to memory of 3020 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 31 PID 2144 wrote to memory of 3020 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 31 PID 2144 wrote to memory of 3020 2144 c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe 31 PID 2672 wrote to memory of 1452 2672 7D57AD13E21.exe 35 PID 2672 wrote to memory of 1452 2672 7D57AD13E21.exe 35 PID 2672 wrote to memory of 1452 2672 7D57AD13E21.exe 35 PID 2672 wrote to memory of 1452 2672 7D57AD13E21.exe 35 PID 2672 wrote to memory of 1452 2672 7D57AD13E21.exe 35 PID 2672 wrote to memory of 1452 2672 7D57AD13E21.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c24ee8097f44144666812fd4680e86b2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2576
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.9MB
MD5ced386850dea5a5fa9b30f79f45650a9
SHA145b1237e44633b378213266bc3843f0bfe6935f7
SHA2562e10620f1e260b28910804a6ea00dde012b5dab7cb2d02607522ad5d53abdbc8
SHA5123006d8a6851f6879e7b434fc81950f1960b34c8c238199074d94e5fe0dbd2b5d9c68ae4446d891995216c359cfdb68bdfce80173cd8e9c590ebd003542e3da79
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad