Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 08:16
Behavioral task
behavioral1
Sample
eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
eaa27cdb38ea8b46d1dda4edf60fd688
-
SHA1
79ffa8c861f441b05573cc4f08eed1511d89cb97
-
SHA256
0c9190ab93b5b17fef74483606baaa955216b139fa371d75706b1eac8a86dadb
-
SHA512
d3b3bc729fa2a4d3d40c7697d445b6dd356de4d91ee3204bb8819698710046b216dc23b70d6b6b162badcb9afa36f2ba7715617fa5af883bfedd15fb14e6c3e9
-
SSDEEP
24576:2mrcY90lEBwTrl8a/gFcDMvzcjukL2uOcbpRYrD3c7yNqcjukL2Y:2mrcw0KqTrl8aJDM7cakLecbpRYE7yNZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000c000000012331-11.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 030000000100000014000000a053375bfe84e8b748782c7cee15827a6af5a405140000000100000014000000142eb317b75856cbae500940e61faf9d8b14c2c6040000000100000010000000e829e65d7c4307d6fbc13c179e037a360f0000000100000020000000444ebd67bb83f8807b3921e938ac9178b882bd50aadb11231f044cf5f08df7ce190000000100000010000000f044424c506513d62804c04f719403f91800000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000001a05000030820516308202fea003020102021100912b084acf0c18a753f6d62e25a75f5a300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a3032310b300906035504061302555331163014060355040a130d4c6574277320456e6372797074310b300906035504031302523330820122300d06092a864886f70d01010105000382010f003082010a0282010100bb021528ccf6a094d30f12ec8d5592c3f882f199a67a4288a75d26aab52bb9c54cb1af8e6bf975c8a3d70f4794145535578c9ea8a23919f5823c42a94e6ef53bc32edb8dc0b05cf35938e7edcf69f05a0b1bbec094242587fa3771b313e71cace19befdbe43b45524596a9c153ce34c852eeb5aeed8fde6070e2a554abb66d0e97a540346b2bd3bc66eb66347cfa6b8b8f572999f830175dba726ffb81c5add286583d17c7e709bbf12bf786dcc1da715dd446e3ccad25c188bc60677566b3f118f7a25ce653ff3a88b647a5ff1318ea9809773f9d53f9cf01e5f5a6701714af63a4ff99b3939ddc53a706fe48851da169ae2575bb13cc5203f5ed51a18bdb150203010001a382010830820104300e0603551d0f0101ff040403020186301d0603551d250416301406082b0601050507030206082b0601050507030130120603551d130101ff040830060101ff020100301d0603551d0e04160414142eb317b75856cbae500940e61faf9d8b14c2c6301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b0500038202010085ca4e473ea3f7854485bcd56778b29863ad754d1e963d336572542d81a0eac3edf820bf5fccb77000b76e3bf65e94dee4209fa6ef8bb203e7a2b5163c91ceb4ed3902e77c258a47e6656e3f46f4d9f0ce942bee54ce12bc8c274bb8c1982fa2afcd71914a08b7c8b8237b042d08f908573e83d904330a472178098227c32ac89bb9ce5cf264c8c0be79c04f8e6d440c5e92bb2ef78b10e1e81d4429db5920ed63b921f81226949357a01d6504c10a22ae100d4397a1181f7ee0e08637b55ab1bd30bf876e2b2aff214e1b05c3f51897f05eacc3a5b86af02ebc3b33b9ee4bdeccfce4af840b863fc0554336f668e136176a8e99d1ffa540a734b7c0d063393539756ef2ba76c89302e9a94b6c17ce0c02d9bd81fb9fb768d40665b3823d7753f88e7903ad0a3107752a43d8559772c4290ef7c45d4ec8ae468430d7f2855f18a179bbe75e708b07e18693c3b98fdc6171252aafdfed255052688b92dce5d6b5e3da7dd0876c842131ae82f5fbb9abc889173de14ce5380ef6bd2bbd968114ebd5db3d20a77e59d3e2f858f95bb848cdfe5c4f1629fe1e5523afc811b08dea7c9390172ffdaca20947463ff0e9b0b7ff284d6832d6675e1e69a393b8f59d8b2f0bd25243a66f3257654d3281df3853855d7e5d6629eab8dde495b5cdb5561242cdc44ec6253844506decce005518fee94964d44eca979cb45bc073a8abb847c2 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2372 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2816 2372 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2816 2372 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2816 2372 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 29 PID 2372 wrote to memory of 2816 2372 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 29 PID 2816 wrote to memory of 2660 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2660 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2660 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2660 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2600 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 32 PID 2816 wrote to memory of 2600 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 32 PID 2816 wrote to memory of 2600 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 32 PID 2816 wrote to memory of 2600 2816 eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe 32 PID 2600 wrote to memory of 2580 2600 cmd.exe 34 PID 2600 wrote to memory of 2580 2600 cmd.exe 34 PID 2600 wrote to memory of 2580 2600 cmd.exe 34 PID 2600 wrote to memory of 2580 2600 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\eaa27cdb38ea8b46d1dda4edf60fd688_JaffaCakes118.exe" /TN ZBrUCVBB2555 /F3⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN ZBrUCVBB2555 > C:\Users\Admin\AppData\Local\Temp\gyFrICWtW.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN ZBrUCVBB25554⤵PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD55171a06eb51a9e568701cb6883d62b02
SHA1e32212115502b18a935ae0408bb541b8d6a78f6e
SHA256c9d245e4f67177966b92e5954a9e99f9b1e14b91999026f4f53d04f373f2a101
SHA512128251dc3eca778bc4f9d06a298e332790b0fc232d822c699bd233f11bf5fdecf4b7bf3976017032bc0d0b38d1282a4e7bffafe81f6603cdbeb107fa6ef79861