Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 07:20
Behavioral task
behavioral1
Sample
e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe
-
Size
1003KB
-
MD5
e972db20d202826935f0baad46e04c6d
-
SHA1
c1c92d813794b31cfd33c0b8f8daae4d7dce4a3c
-
SHA256
6b6abf51267a03fe3737aa7dbeb85184f421d156b56f8f7ac453c107ad59e958
-
SHA512
c726c7c491f12ffd2226eaa43c7f17917fc5f375d4304c8dbb7252eb8073d9308da4229c9bad438637fb9b33034b4dc678aa547ddcea4446e9ab0456e285201e
-
SSDEEP
24576:vC4Oi6Ze1r+atgaLDMTho11LhQGQoadai7D3uITjIFOxo53ApIj:vC4Oi62jtgaLDMTG11LhQGQ7ai7D3xTi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1048 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1048-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000900000001227e-17.dat upx behavioral1/memory/3008-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2548 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1048 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1048 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1048 wrote to memory of 3008 1048 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 29 PID 1048 wrote to memory of 3008 1048 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 29 PID 1048 wrote to memory of 3008 1048 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 29 PID 1048 wrote to memory of 3008 1048 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 29 PID 3008 wrote to memory of 2548 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2548 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2548 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2548 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2972 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 32 PID 3008 wrote to memory of 2972 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 32 PID 3008 wrote to memory of 2972 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 32 PID 3008 wrote to memory of 2972 3008 e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe 32 PID 2972 wrote to memory of 2580 2972 cmd.exe 34 PID 2972 wrote to memory of 2580 2972 cmd.exe 34 PID 2972 wrote to memory of 2580 2972 cmd.exe 34 PID 2972 wrote to memory of 2580 2972 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\e972db20d202826935f0baad46e04c6d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e972db20d202826935f0baad46e04c6d_JaffaCakes118.exe" /TN oC7ri3HGb305 /F3⤵
- Creates scheduled task(s)
PID:2548
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN oC7ri3HGb305 > C:\Users\Admin\AppData\Local\Temp\bSbXp.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN oC7ri3HGb3054⤵PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ac6b7c06099831a790c36e6329f58214
SHA1265878221f0d269febffe72ca4a255ead30219d6
SHA2568a85227fd2ef56c246d30cdcb014e7a54d9f05392ce0e7addb87e7657297add5
SHA512b7e470d60fb28dd259705f8fe9e9ea139148a6ae6a929cce8af63ee8932ac5e488849ebff169645727375a7e1c4be8028f2237e2604339dde9af7b455ae11336
-
Filesize
1003KB
MD582ac0fc58186b6844a24d334050e1acd
SHA15e42c6a7a14ab59d38afa607eec8743955945e1e
SHA256e807465f88a3fda9b8f846648c04c5f9e7bc15ce536b1dbba7372bb887c678ce
SHA51222ce1a9dc81a55a1a0dfe544a076f13d8c7699c7f50407bb34ec98658f1e2a45b96d154ae22a640807e0ee1fe30c65a1fc1376ea881873b83eb4c4b0f511a431