Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe
-
Size
7.9MB
-
MD5
d5beab07667b8fdf824277baf63a5dde
-
SHA1
205cb43ee9d4c7437de71a102446000840f1563d
-
SHA256
b541d361391b2db5b07660135afa83c2451eea061b0374191a21986fbab361f9
-
SHA512
a42b9abd1340178ebdf0029aecc52d2147648f5196001152386058ba6f33efbd207074860ca0f3e7107167556eac1afe889b859625f4af1226f194e1932a0580
-
SSDEEP
196608:8Cazg7DSmCazg7DSmCazg7DSmCazg7DSN:Eg7uOg7uOg7uOg7uN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2468 7D57AD13E21.exe 2588 Scegli_nome_allegato.exe 692 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2468 set thread context of 692 2468 7D57AD13E21.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2456 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2588 Scegli_nome_allegato.exe 2588 Scegli_nome_allegato.exe 2588 Scegli_nome_allegato.exe 692 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2456 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 28 PID 1252 wrote to memory of 2456 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 28 PID 1252 wrote to memory of 2456 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 28 PID 1252 wrote to memory of 2456 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 28 PID 1252 wrote to memory of 2468 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2468 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2468 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2468 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 30 PID 1252 wrote to memory of 2588 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2588 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2588 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 31 PID 1252 wrote to memory of 2588 1252 d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe 31 PID 2468 wrote to memory of 692 2468 7D57AD13E21.exe 35 PID 2468 wrote to memory of 692 2468 7D57AD13E21.exe 35 PID 2468 wrote to memory of 692 2468 7D57AD13E21.exe 35 PID 2468 wrote to memory of 692 2468 7D57AD13E21.exe 35 PID 2468 wrote to memory of 692 2468 7D57AD13E21.exe 35 PID 2468 wrote to memory of 692 2468 7D57AD13E21.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5beab07667b8fdf824277baf63a5dde_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2456
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:692
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad
-
Filesize
7.9MB
MD57f83ff75e454331136183afe1367edd3
SHA1e3f8b3edde60cd8d2f2b23257a5c92ba1882a5cb
SHA2563b295c8dbcc5b54d392868af13a73c1466dabf97298de84d881b70d41a9671f2
SHA5124ce4372a4cea16e2e0e3af3196d4b6f13dcd0306eea354aee6359c68c3e03f937fc53144a4a876d94e4ae4168c856ed4ad91c38406b43432b2a0cb89b8ca3800