Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe
-
Size
7.9MB
-
MD5
e857bfc82e36e6c8862532bedf12e8f8
-
SHA1
0d1e8c9f5b4dca9b225189bc017de804f6d3080b
-
SHA256
dbcd952a93d63cd50bc0d7eed0ccad8594db23792afe8fb0fc43c060b47f30d6
-
SHA512
60ce7f4afc30536dde964d7ec528fba4a93d13b498086432f5c87081db1978e127a026dace84e06bae88872f97cf14eef3593d3393b5e2464ed4855711694aed
-
SSDEEP
196608:0Uazg7DS8Uazg7DS8Uazg7DS8Uazg7DSv:qg7uyg7uyg7uyg7uv
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2860 7D57AD13E21.exe 2592 Scegli_nome_allegato.exe 1908 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 1908 2860 7D57AD13E21.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2208 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2592 Scegli_nome_allegato.exe 2592 Scegli_nome_allegato.exe 2592 Scegli_nome_allegato.exe 1908 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2208 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 28 PID 2824 wrote to memory of 2208 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 28 PID 2824 wrote to memory of 2208 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 28 PID 2824 wrote to memory of 2208 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 28 PID 2824 wrote to memory of 2860 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2860 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2860 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2860 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2592 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2592 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2592 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2592 2824 e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe 31 PID 2860 wrote to memory of 1908 2860 7D57AD13E21.exe 33 PID 2860 wrote to memory of 1908 2860 7D57AD13E21.exe 33 PID 2860 wrote to memory of 1908 2860 7D57AD13E21.exe 33 PID 2860 wrote to memory of 1908 2860 7D57AD13E21.exe 33 PID 2860 wrote to memory of 1908 2860 7D57AD13E21.exe 33 PID 2860 wrote to memory of 1908 2860 7D57AD13E21.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e857bfc82e36e6c8862532bedf12e8f8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2208
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD54eb691d56b1ecabf2c3814649484c688
SHA16ab7711816aa89e86b59b780d0b8a4a679a50e61
SHA25640393c6bf8337e3ea572a04181e14855da73bdb050883cf77c1ba0d326ec8b03
SHA512f18d40aa3b9a01bc9c46ee0a037434c1ec0453175a7d63de40509f29739ea8168033189af26f17e90cf79488dd3d5c72a75beb85be264f76f41ecb60a16bced0
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad