Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 10:22
Behavioral task
behavioral1
Sample
e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
e9c617d72900849dfe3dc8b291e27250
-
SHA1
80be52de842bfe506be4fc8f4279f9780a445763
-
SHA256
c2279a8523b375e7967ef503a2519f028d30151c3eb8a303a81bf95e736d7044
-
SHA512
e90c1c4a8be356d65700c4a2093d3ac1a065d45371738161f7c514e545e0f66d0ef701dd74c4b103570a72f315ae5ba3dc0e2e054a7a052e60c96e805c72810c
-
SSDEEP
49152:BWCXXa0LdcHwokleFows8CHs0psJFRp9Ue4Sh3jK:8PHKlYowstH1sJb94Sh3m
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1912 setup.exe 1672 Setup.exe 704 Cleaner.exe -
Loads dropped DLL 7 IoCs
pid Process 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 1912 setup.exe 1912 setup.exe 1912 setup.exe 1912 setup.exe 1912 setup.exe 1672 Setup.exe -
resource yara_rule behavioral1/memory/2296-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x000500000001a4e4-243.dat upx behavioral1/memory/1672-257-0x0000000000400000-0x000000000053D000-memory.dmp upx behavioral1/memory/2296-267-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1672-268-0x0000000000400000-0x000000000053D000-memory.dmp upx behavioral1/memory/1672-270-0x0000000000400000-0x000000000053D000-memory.dmp upx behavioral1/memory/2296-491-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\1 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Setup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\2 Setup.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\3 Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 704 Cleaner.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1912 setup.exe 1672 Setup.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1912 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1912 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1912 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1912 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1912 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1912 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 28 PID 2296 wrote to memory of 1912 2296 e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe 28 PID 1912 wrote to memory of 1672 1912 setup.exe 29 PID 1912 wrote to memory of 1672 1912 setup.exe 29 PID 1912 wrote to memory of 1672 1912 setup.exe 29 PID 1912 wrote to memory of 1672 1912 setup.exe 29 PID 1912 wrote to memory of 1672 1912 setup.exe 29 PID 1912 wrote to memory of 1672 1912 setup.exe 29 PID 1912 wrote to memory of 1672 1912 setup.exe 29 PID 1672 wrote to memory of 704 1672 Setup.exe 30 PID 1672 wrote to memory of 704 1672 Setup.exe 30 PID 1672 wrote to memory of 704 1672 Setup.exe 30 PID 1672 wrote to memory of 704 1672 Setup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9c617d72900849dfe3dc8b291e27250_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\7zS2166.tmp\setup.exe.\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\SSESTART\Setup.exe"C:\Users\Admin\AppData\Local\Temp\SSESTART\Setup.exe" C:\Users\Admin\AppData\Local\Temp\7zS2166.tmp\SSEset.dat /BS3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\7zS2166.tmp\_Run\Cleaner.exeC:\Users\Admin\AppData\Local\Temp\7zS2166.tmp\_Run\Cleaner.exe -kill "weatherpulse.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ae84dda537ef770c3aa9a90ffab586e8
SHA1245c76de8ec5a1096b7a8fd5989331b22743bb3d
SHA2562697c48bcaf878d08bfeaa0eae52ad40fe615a4da9045101f7506e5649c6ef31
SHA5122daeeced86a35efec744025a4264ff4b19bf2ccb156de2affcdc21da82e707e3a9b1deaac1dc66605679e76c31d7346c7914234c602441c284545ba634f68867
-
Filesize
150KB
MD5a8b35ea59a9b561f5a646720708e6e95
SHA16fcefce755ca8c036c9e58bdeaab70dfdb9cdeca
SHA2560e732f31ccb2a8a69434509f0c2e890a501d4fb52a4bb5c7a0db1a7e4c4d9967
SHA51220d185a9cbc2783bf25879ef4a7ecf4037d0112f9d99540ae01f6e4cf59825ed30d7b904ce7608320ed6207a468025b18f222f6dbea33967a06454808a3745a8
-
Filesize
27KB
MD57669383f7597f81f8a214c7174c1c60e
SHA1eb3949527ed6e56333f7de80880043ce8376de88
SHA2567fb46318b80713650b1ec1641a6e05ce1ad6b4a9efe9ced13a392e3b9abf8988
SHA512a8f842eef9d195bef7ba8737da521b91c862e1a1c1de5565547bab1f02aeaf633b277c9a1eedc6365fc794025f6eb069857a38dc217f7482f156a64d20e47f29
-
Filesize
20KB
MD5394a4503c5c88854048f35f6bf8185fc
SHA14cec41152e14843c61805c2d3012c50fed24cee3
SHA256b72d0d2a02476446719b44d1b120f6f817e271cee1d712298398102c6a37c4e9
SHA5128c88afc5c3597b81a5d330f6d835f05be589f5f5d5934426052e3c05c30b44dad141bc80fdd593f3ecdc4b960e23136cf38449c4332b0a56a43e42c61bc3c940
-
Filesize
24KB
MD59419fe05b5bf4232dd3ec5e1e0c24b37
SHA13bf9bfe977db6d6a1065b239167c38085cae6507
SHA256eeac9572a1d816be6aa7d86b6ab3c3f0d30985a5c02974a95ccbe72dd676e24e
SHA512c4bac245e8ee5d7a3549d0634003e4592125678a8ac389fa4b9c53505888424f14bb964c7bc99e7005e14318dc771c99c7a40b85eaf763332eb5a61453ef26d6
-
Filesize
31KB
MD55a9be3dd584bd7b83a16b9f6e90b210c
SHA1d3fb1f1b425b73bc36e3ba5b868f8d1d41d800c8
SHA2568921e162d26de380a9e089684088cdc8f14c9cda9624ef3def9a923648478b9b
SHA512ec13473b4d21f98d15042280c0e9a77d61a5fa7e5b75c58543274a7bd5e597a7df371fa774c0676fa785e2b997a2a052e28bcc143e91b0e7dc04ba38c825bf37
-
Filesize
27KB
MD56e5be30a07be5cf947236e20755a271c
SHA1517d4f0003f47faa03388be652411419e360a6b9
SHA256915f0c588f4e34fab30a6ac188e10627a9c4e4a28599b24c9300ee820eb03178
SHA51280ea54be84a0b8733d416b94b960d6eefcbe058ac85fb11662d89a077ce24896b3560a6302803ac1b0eb04d9af0b945364d77fa433a9cad41eaf657438d4fa14
-
Filesize
7KB
MD5202715d149c4bd6ebd96109704200462
SHA11d9cece968fb21d41fd5747d42561f147a287ecc
SHA2560b55b2c9e15160fe2a138af8a9f8edfc611c05020cf3bd86958ce39eae3a4b13
SHA512eee353da86905ca4886c9378ad522586b46f07909a03a7224b84738087b97d7780d01e5e044341f413ece4bda8542a2dff92c8974658f7f1f8c6242375cf3303
-
Filesize
23KB
MD5e5427bffc232e741bb257188841fc1b5
SHA1ac17e221c5ba3d367593cfa38873ea8748d1500d
SHA2563de59b76d4b0e7dbf04f26cd6cd9e190309d56ea89653d5aea75834c992417fe
SHA5120b4672c1ee20d9aa62c4e6d6dbda99a10e3e1ec7d3f93f73d81d74295a9328fe8bb8223bc0d6cfe38d0badeb4ee005e35dbfa9f2bca4e3f7f6f96fb2f1ec3314
-
Filesize
16KB
MD52f6cad1cc658c61d105be5c9ab4289f4
SHA1ed2a8178554699355f7a108483a419a4f68304b4
SHA25601239bb001254dd8400d6e4797f1c45c1cfe508521bd64949ebf7cfd43a2c6ab
SHA512547f350f6c724adf3513d43fbe38b1f40e74b88dd0ba1da85cdb7e79c8889900caaf3b5ace42b07c38a7296081a450bd0b14bc940db57f2ae767242907501ef1
-
Filesize
11KB
MD5a1c95cd1c8e6b8ea1f16d0d4c15674c1
SHA1f30238ad8aea7b07d5e1b3a00eb76d1cd81d2f50
SHA2562265968ddaff2525d0c84deb7b3d5d468927138aebd54dbd4f5535ce99ecd6b8
SHA512480985e91b64515558dfe2cec0f41e52c5794f20006ebbdd024a37f5239d4fdc6b76043c74b647df66eb204c0091bc723d361fccb3192ed20e642436d55fba3b
-
Filesize
19KB
MD584e74dc938a454289a34c57fe159b557
SHA179335881da2ffdb0b0f780472abb623da5d5b9bd
SHA256882e19d587eadc8b0dffa750433573916a97c7fe7f1c1be469f829f1fa6a8f35
SHA5120899986afc936655df941bd743e082a5dd6e6a8c355deb38a830c35518c8f6184947c782da1d83df050d50b7d47297c715e657755a227f13442661d405b500d2
-
Filesize
29KB
MD547470e7ce4a561531c398eea147518c7
SHA199763f84c6c82a77d66536b328be32e378b46823
SHA256b6aca58f484acf140d66852ad3b94c1952350d84973925ecb1d913d7e5f9be7a
SHA512d7901caea5687e87d79a75486174f1572ff7976d378e29c45668df86ce105f116fa463597bf97face22b82c1df44ce6245a938f18c0dec47896f4db6d207fe7b
-
Filesize
21KB
MD594730e222e41a4da56769926ba744efe
SHA1f29cabd608b962f2593ebc617c60e8fcdfee43fd
SHA2569beebe40ef8b5070d6fd78d439fcc842f0fcc573a9b7865c9d43f6026e6a5caa
SHA5128d3ac0e4089229a7f584af994504741bb8ec9ef1e24263b9205f3751bc681f68332b3e7e53eb326881fd551bb43cdb2574c3f482ed5548ed11c9231fb8fe3f01
-
Filesize
26KB
MD56bebe5fd341533e70b62ef37a834a593
SHA15261c66f774e3ddc9d80a19c074a123e784bf186
SHA256afadb0fda13e422c83c2dd846f047b611d87366bf47d463df386e3f8d298d13a
SHA5127376feacc1c869ecb5bedac493708d836884c086227550a65d013b84bd4ee5927b6a0609f6e9802747b760a6b593da8c5a5f8fc64a98843094c6f732d6b6e64f
-
Filesize
18KB
MD5d24a72a56461eb2a430e7720b8e256a2
SHA13693012b943bdd60ea00747c5539d10676d901fe
SHA256329c35622002d3cf0b330ac988da8aed481960846bde44b7739ae91514db032e
SHA5125bc07c2a0af32b886ec73a9685f682aadd21663fbea3a978fb6656c21c4a1cd6ca1c87c005074b5d6e2f6a7e13ef16b45e54a66dadf02398d04e4a17febc7143
-
Filesize
19KB
MD5158a05061a5fc9626202f581ad718516
SHA11a52471f6e660492a9dcb36af088b264c1bf2630
SHA2563b59f3579fd0cb69060d911aa65de180e0047939dd52c9b58e5fc7f779ffeb1a
SHA5128df51a293fe7ceca4a41075038c8e746168795628e59b73b97dd1573b03c92cfc49e965d64234223a3de36e73143816e8e0362aeb2ba824b3b43019622b42157
-
Filesize
14KB
MD5145591377ee991277b1a3bf5f71b54d8
SHA1662ef9a079245409349c5450c438a736975361cc
SHA2564258e32a73436456a11f288007636e0ceda5af07f7a0436ea932d2886b307c93
SHA512f638984c22004be63bba653dfe95411753a4e5a9da246a597b914c0f38709ec09923867eb95517bd0caff902cb289f0703b2d4ee8ff95fb542a374141bf99dfe
-
Filesize
32KB
MD583388969cf6cffa28f91e5a54e9f4c4f
SHA1e88f02ae70a85d2a2e949d55348dc0b1a1d5f25a
SHA256c743e1b2e590991068003d08a767063c8ce71fda86ab9839d6ac265390f510a9
SHA512274076caea1f59944330ff208ae9df7d3855000f4dd4c9abf7fd70e23d055e505994e75edfc1e52a01cc31c999574e401de7b5b56b73b97ed02ed48b97b31728
-
Filesize
25KB
MD59852bb0cd99b617fa4b8bb815ebaf0a8
SHA11775c9dd2e881982efe4cab68281996ca35de417
SHA25683a9e6d97fb601c19aa943801a39a5e0f38cc47fdb9e19b6c4e21be874e40de5
SHA5127a92fb4fa6c6d8f39ca38888062dddd31bf8514e42f8f85d6f7d91f73693f237c1142d2d63b3794ec272f0b724fb0c94aea627bfd7233e18553e3035f5053b81
-
Filesize
24KB
MD5a2fd4e61cffae0ed7584b0bbd6b28a24
SHA1adc6e0d6dc8a7ce3be4cd1c56016131556f04a5b
SHA256cca466e68b4fbb8b819954a4b7311a7796225b038efa787e9540ddab080e20b0
SHA5126e123ed3ea1a91c3641347e920493e7dd96fd39b16da29580c69159d13dc97a4ca5f056e01499a63ca0b5b78085a8f62fa20b35aaedb3a7526144b36899b937e
-
Filesize
11KB
MD5523adfd4e91379451b0f09934d6044d0
SHA156006d8b4e97d3e857bbae72bc7a87d308dc83a7
SHA256c7b8afc9c66bdf033f372d32f80b7b83f678df0399395a343985355d1dc57f1a
SHA5121c8744c22066d9028bb3f1c63808f2764ebab247d96f8e7f02b440225551496eea0c179b91a46ae9a24bb0c5e6ab517becce3029f421159d3b3472722dfcd6fc
-
Filesize
37KB
MD501f572595614139b002b97b24e1ebf82
SHA1b4363c94908cbd3f47725fa4a4575789a9758ca6
SHA256140bbbef3448d205fb49a67fbd4b9b5af724e25e1992a4430e9cc3a364c94f9e
SHA5121e6a132095571d7e2c6592de4b7344d731e6858b9885fb2428167a0747b3ce554552020498284f69e15b713c952c5c13c87bc2d30d39dbf7f41543724728253a
-
Filesize
33KB
MD5a0381d4e30581c63a79b66e3e21926f9
SHA146b2ceac87a902c4d72b06f376290dc4441ba6e8
SHA256deb2cdd6200d156b559a70310abd07c506a11da10253df703f5cc84c0dff9c4e
SHA512b714cdb399250c9c529d778e8d859bca69ac0974a84c4a21a1d814527e26d7d9da66ca3c12fd6cbd81b1f16d4fc4c568695954c0724f310e7472620f26423b12
-
Filesize
28KB
MD5e381de075c866796737c3775d1b04c8e
SHA1b744e87a24e66f45db342865b47f181e90132da6
SHA2564856bdda3256c223f18cef23c6d4f545d60078314fec4ad3d612d6f04d7e44e4
SHA512089e35ca0d5310d2c645b3b90b6ce37a30349e5c89bd86577b1e1acac68a6a9c695c555ba7c7f77ef0bc5db6e8833c85f0b61b3e2d7570cb9795fa441854bb5a
-
Filesize
26KB
MD5425ba16e33d54c6be49f564319cf8a36
SHA1d8516e1df391691c054549ea91b06a19112e7807
SHA256907b8cf805b7da19d4067f3f6077e9b4bed1c0d271eb0f3dd3553dfa36354f1b
SHA512fb93f1c401907586d834534bf250c49556a607645be75a8264d107f70abc36996a1c8c255dc0d00701c8106599f2bed18d7c327e582bdd2f7b0c7493bd7a6d6b
-
Filesize
23KB
MD5e13340797df2664c3362d9f347515d51
SHA1845d185881f9e3cd713a45e49596243221b11309
SHA256ebba5542fc22a4318f730bfc3263014f058ceea6c9e6044c9e0dce97759620b7
SHA512212b0bac20ce028359935d0e3e7364596c3293b29d361d62846a432bfe4e6c68de28a380a239b77b228b17e8975a41950f6c132febc05d8197f64d618a397202
-
Filesize
50KB
MD580a452eb32febbc26d9d0e0116c996ca
SHA114154b18cfea48a8bb16c534e8d346c63364c062
SHA2565c1ba64d93a5594f068ca62a41f33e8a55536d6d091cd6f6cdd64951b46747cb
SHA512eda8fdf9f91a2446486856ae684c159b6d896efdac4059d28080c5693bdad5ad55817d88e580e2776d164eaac979facaca803cb4029290ce54448a982551ae80
-
Filesize
384KB
MD5f585a3cfdf5a3c426f8ef0db79014ba3
SHA1372e87ae157e956247ede545dc3172ae7ccd1757
SHA256e22b081fa82eacf38d62c140433d321e315d84f67e61e4e0800034ca2f4a3a58
SHA512c7d647bcb13a734bbc3882282b451f40eb3ad99b45712c25f751fbf729dca093c5c3c46d49469b34c2a6022ebaae99100eb15bca992b7356da19cb49d40da72f
-
Filesize
352KB
MD5e1dda5e7f791d78b8d68db6105ae20ac
SHA1a5c2bc9c340cc890d31c8e7774e7ae9ffce2362b
SHA25609e7d1c17ca34c5cfa0be2ba11cfd3d38b30f95023a929a9329349c332fe78e6
SHA512977afa75f893522930c22d84505b1a5a3f5a1fb20d595596312b5e90c5e89d7c621e9efb6a9122f10d18e7ffbf621541b7783e5e1236369b300ab416f193920d