Analysis
-
max time kernel
153s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe
-
Size
1012KB
-
MD5
ed91324f0907b0f4b545b7520ab8e469
-
SHA1
c473dfe2f0d04e65ef0a90c52b65d74a57991236
-
SHA256
79ff73ebfde3c274add059b985205481e2a77cf5f04163ca3a42682b52bc44df
-
SHA512
ba29fe6e5f12b5e084e6eb5cd715a8713ded394fd29641266124368ac7c782c376cf7c15ea46ef3453808fd792218981fdc7bc41af2e29bcc5c6f4cf5123d806
-
SSDEEP
24576:I3YWhPxKAxGuAHSM1C7jYf96EAHZKF4n7S2NTtBT/:21hHgukSxjsA5KFUttBT/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2068 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 541285.exe -
Loads dropped DLL 4 IoCs
pid Process 2068 cmd.exe 2068 cmd.exe 3032 541285.exe 3032 541285.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118 = "\"C:\\Users\\Admin\\AppData\\Local\\541285.exe\" 0 44 " ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\541285 = "\"C:\\Users\\Admin\\AppData\\Local\\541285.exe\" 0 32 " 541285.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2148 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 541285.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe 3032 541285.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2068 2180 ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe 28 PID 2180 wrote to memory of 2068 2180 ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe 28 PID 2180 wrote to memory of 2068 2180 ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe 28 PID 2180 wrote to memory of 2068 2180 ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe 28 PID 2068 wrote to memory of 2148 2068 cmd.exe 30 PID 2068 wrote to memory of 2148 2068 cmd.exe 30 PID 2068 wrote to memory of 2148 2068 cmd.exe 30 PID 2068 wrote to memory of 2148 2068 cmd.exe 30 PID 2068 wrote to memory of 3032 2068 cmd.exe 31 PID 2068 wrote to memory of 3032 2068 cmd.exe 31 PID 2068 wrote to memory of 3032 2068 cmd.exe 31 PID 2068 wrote to memory of 3032 2068 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1857397.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v ed91324f0907b0f4b545b7520ab8e469_JaffaCakes118 /f3⤵
- Modifies registry key
PID:2148
-
-
C:\Users\Admin\AppData\Local\541285.exeC:\Users\Admin\AppData\Local\541285.exe -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
437B
MD51f21acea505232af6b556c3ea870e5db
SHA1e41bff81e902f0ebcfffa0ee62a880d504a0fdf8
SHA256b0d1188b7b10d416a8d836e5e140abffb8b61397c1ad8d727a58befacfc64be5
SHA5121cc760b0bdd484286f690e2b416e73cba0e41ce5f40f4879eb31a6580a42f3a79f98700da2cf37c3a54f34e9a4276632b0cc4eae5b318db2770656fb10198b4b
-
Filesize
1012KB
MD5ed91324f0907b0f4b545b7520ab8e469
SHA1c473dfe2f0d04e65ef0a90c52b65d74a57991236
SHA25679ff73ebfde3c274add059b985205481e2a77cf5f04163ca3a42682b52bc44df
SHA512ba29fe6e5f12b5e084e6eb5cd715a8713ded394fd29641266124368ac7c782c376cf7c15ea46ef3453808fd792218981fdc7bc41af2e29bcc5c6f4cf5123d806