Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 13:05
Behavioral task
behavioral1
Sample
e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe
-
Size
1003KB
-
MD5
e786bd4e54c08e59ec91da09a349c549
-
SHA1
e955242975ff0f0987e3018a0100dfdd2b9f49e9
-
SHA256
9b4f816de287b793db32595455867baa4546913e6e694bf826061d499869618a
-
SHA512
3cba250b6fac2aa85bcc7cb6b5b3ab3f5d7c60cb872da31effbaf2bb3fa9b6b649bbc89f5ca5b4b4f7ceb7bda5e92eb4c3aa3414f5955b99cda7a42adcd1e9d6
-
SSDEEP
12288:GfLOuN5gQdylvVXo5cWEJGxP8DpHvAkFCHaH7/DeaYrbWGv0MwDMXAS6UTQxfHdR:CNFylFgob9jyaYfWGv1wDU2UTQVAU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1300 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1300-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000b00000001224c-11.dat upx behavioral1/memory/1300-16-0x0000000022F20000-0x000000002317C000-memory.dmp upx behavioral1/memory/2228-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2492 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1300 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1300 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2228 1300 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 29 PID 1300 wrote to memory of 2228 1300 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 29 PID 1300 wrote to memory of 2228 1300 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 29 PID 1300 wrote to memory of 2228 1300 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 29 PID 2228 wrote to memory of 2492 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2492 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2492 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2492 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2568 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 32 PID 2228 wrote to memory of 2568 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 32 PID 2228 wrote to memory of 2568 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 32 PID 2228 wrote to memory of 2568 2228 e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe 32 PID 2568 wrote to memory of 2640 2568 cmd.exe 34 PID 2568 wrote to memory of 2640 2568 cmd.exe 34 PID 2568 wrote to memory of 2640 2568 cmd.exe 34 PID 2568 wrote to memory of 2640 2568 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e786bd4e54c08e59ec91da09a349c549_JaffaCakes118.exe" /TN MJu5Ub8Eff50 /F3⤵
- Creates scheduled task(s)
PID:2492
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN MJu5Ub8Eff50 > C:\Users\Admin\AppData\Local\Temp\irMPru7Cr.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN MJu5Ub8Eff504⤵PID:2640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53090ba87ee900cac21a27a595cc34fb6
SHA1fff45beee36509ed2d793ba23c667e03e9dcc561
SHA256412e78a758daed12475b2eec5e39423fed07a99fc6e2671dae9d30d0e4787272
SHA512ab1691578fa004dace83850c4acc1ab4644226f4d725fa6995933d175f92314acd5469eebfbc54c73597320187af995a8acdf5bb7036220fdb04e1b10bdbe4d8
-
Filesize
1003KB
MD5f0bac4bafa8e38543fb49f2cbb3299e0
SHA173a7101b60116acb789beffa08d235c972f88a35
SHA25647d0802a7561e43d60a56f58b8219bf7277d6bdf3e1c23a5312023e696d7224c
SHA512931c9b997e152e0639fc09bbab68732010d5ebfa41ccdee72a3feb47a7e680030286e9169133406619bb66cad263edff8d1b1422b56da995f8bb0d34152160a2