Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe
-
Size
78KB
-
MD5
e964f8cb58be52322047ab692bd18d76
-
SHA1
b1b074596766a8c3edb8785d82d4e91cb191206b
-
SHA256
e5145f391624dbe950a63516596baf4875dfe8238647c31d9debe70c6c49df65
-
SHA512
7210f182ad732e5bf6c36e88e084662e2b889a2253a586f4e3df5385ab73babc0eff8834f02371dcc999d923cf8f1f0085e72555a7ae7432843e2aa5c05ab24c
-
SSDEEP
1536:S7odWaCCZyZCf5+MYf1Pqf7wPhyMDG4rA/+pP2N8eML3gJkovLxMXhF:S7ofCxaAMYfpqfkJPG48/+pOkkOoO
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1356 xpupdate 3024 xpupdate -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WINDOWS SYSTEM = "\\xpupdate" e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WINDOWS SYSTEM = "\\xpupdate" e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WINDOWS SYSTEM = "\\xpupdate" xpupdate Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WINDOWS SYSTEM = "\\xpupdate" xpupdate -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpupdate e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\xpupdate e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe File created C:\Windows\SysWOW64\xpupdate-up.txt xpupdate File created C:\Windows\SysWOW64\xpupdate xpupdate File created C:\Windows\SysWOW64\xpupdate-up.txt xpupdate File created C:\Windows\SysWOW64\xpupdate-up1.txt xpupdate -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1356 4392 e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe 85 PID 4392 wrote to memory of 1356 4392 e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe 85 PID 4392 wrote to memory of 1356 4392 e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe 85 PID 1356 wrote to memory of 3024 1356 xpupdate 86 PID 1356 wrote to memory of 3024 1356 xpupdate 86 PID 1356 wrote to memory of 3024 1356 xpupdate 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e964f8cb58be52322047ab692bd18d76_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\xpupdateC:\Windows\system32\xpupdate2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\xpupdateC:\Windows\system32\xpupdate3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5e964f8cb58be52322047ab692bd18d76
SHA1b1b074596766a8c3edb8785d82d4e91cb191206b
SHA256e5145f391624dbe950a63516596baf4875dfe8238647c31d9debe70c6c49df65
SHA5127210f182ad732e5bf6c36e88e084662e2b889a2253a586f4e3df5385ab73babc0eff8834f02371dcc999d923cf8f1f0085e72555a7ae7432843e2aa5c05ab24c
-
Filesize
2KB
MD57aa17a8a004ca949185aa0d2abf9fa37
SHA175f4f53487e212370967a72b9589b42539ff5a04
SHA2563e606e3718e7ed7e58cdeeb9ce7743730fb1e8cde147b13698527352370d26d5
SHA512e3ef118d09be2fc325f1574ba642232f7037e1ca8f0101d8095aa7fdcbf944db1a4cd7a3b529e38c1193ba37c2129873323aff5946f645ab524677b858cdadcd