Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe
-
Size
355KB
-
MD5
e900e6cd547787c0ba378c4b46075d74
-
SHA1
c50fdd3e4679dfaaab9a6b88883f71582f14d417
-
SHA256
28170716df5b62b92891e8e22847182fc2ac10b96222b74d0ad1230bd6b877b8
-
SHA512
356e05929e245de6a0e7670438f61771a3b12a786afd8f22cc67267aa8cadccb59569dbb4c09815dfaa1818e4974e605c9099b5c6f381a43f85495dbb7c2f8f2
-
SSDEEP
6144:JjT5Zh17eWxoG/+ov/2OIQ4wW3OBsCeAWnNFP3b4yRbLdzzibNjgA:JRZ+IoG/n9IQxW3OBseSN1RbL1ubNl
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 4 2720 WScript.exe 8 2720 WScript.exe 9 2720 WScript.exe 11 2720 WScript.exe 12 2720 WScript.exe 13 2720 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\info.js WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\WEHHRB8F7I = "\"C:\\Users\\Admin\\AppData\\Roaming\\info.js\"" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000e000000012321-7.dat nsis_installer_1 behavioral1/files/0x000e000000012321-7.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2468 schtasks.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2720 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 28 PID 1188 wrote to memory of 2720 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 28 PID 1188 wrote to memory of 2720 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 28 PID 1188 wrote to memory of 2720 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 28 PID 1188 wrote to memory of 2724 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 29 PID 1188 wrote to memory of 2724 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 29 PID 1188 wrote to memory of 2724 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 29 PID 1188 wrote to memory of 2724 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 29 PID 1188 wrote to memory of 2724 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 29 PID 1188 wrote to memory of 2724 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 29 PID 1188 wrote to memory of 2724 1188 e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe 29 PID 2720 wrote to memory of 2468 2720 WScript.exe 31 PID 2720 wrote to memory of 2468 2720 WScript.exe 31 PID 2720 wrote to memory of 2468 2720 WScript.exe 31 PID 2720 wrote to memory of 2468 2720 WScript.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e900e6cd547787c0ba378c4b46075d74_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\info.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn anydesk /tr "C:\Users\Admin\AppData\Roaming\info.js3⤵
- Creates scheduled task(s)
PID:2468
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5d5ad2ec0445ff7fd803f7f3ef8d5e00a
SHA1c928fba62f4eb3ae1aad2c5c34782908ad57f715
SHA2563f538dd314b6b25cb556f4e49dd2d835c3138768631054231e6cd9a3a23ba1e8
SHA51298fd1a026bf04d7e20f19ae0ad8985e99489be60c022836b6d9950723b88f9f8bd29c4477fadd7f67f4845ed1698b3bea1dc61e9d6c56ec5f70e17f8e4c8964c
-
Filesize
66KB
MD59b8a268527c79c2e37cd3630769303a8
SHA1e16d1a407e8374f9882c7814f5dc630e0a15690f
SHA25607a9a0a4026aef36799649a86095f953fc8f7a32c1dab0a789c4bbb69ed46283
SHA512afa9e670e770d2fca423fd8fcd72c5754ec174a2d626ad478f53f3df3f99bbf58c975afec05ce9135f28e2261efdf26b429ce1ba27135aed5d45bc1e5c86c6d7