Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe
-
Size
208KB
-
MD5
f008b0de94f1771f7cfd2a5b51a6ff90
-
SHA1
9904cac611039d8b90913f86576017631f8d80de
-
SHA256
258514730bb9fc1f9e192895664a3ce0953d1b29d7301c0247d5d72d1d569e3d
-
SHA512
78494bc569bc45e3d382bfa69dab987cf4377b410be7b81d141c1e339bb3b818d5101bdaaea7fba8abce31bc52579cf5451b8b835e1e1305fdcdbb4f4790c94b
-
SSDEEP
6144:rl4mjZF//vYdAiwH11XtVPNoguiv1Ihoay6y4EGf1:fr//QdABV1Xt3juC1IhNbDEe1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3444 u.dll 2108 mpress.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1564 1932 f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe 86 PID 1932 wrote to memory of 1564 1932 f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe 86 PID 1932 wrote to memory of 1564 1932 f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe 86 PID 1564 wrote to memory of 3444 1564 cmd.exe 88 PID 1564 wrote to memory of 3444 1564 cmd.exe 88 PID 1564 wrote to memory of 3444 1564 cmd.exe 88 PID 3444 wrote to memory of 2108 3444 u.dll 91 PID 3444 wrote to memory of 2108 3444 u.dll 91 PID 3444 wrote to memory of 2108 3444 u.dll 91 PID 1564 wrote to memory of 2372 1564 cmd.exe 93 PID 1564 wrote to memory of 2372 1564 cmd.exe 93 PID 1564 wrote to memory of 2372 1564 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\564E.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save f008b0de94f1771f7cfd2a5b51a6ff90_JaffaCakes118.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\5786.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\5786.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe5787.tmp"4⤵
- Executes dropped EXE
PID:2108
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵
- Modifies registry class
PID:2372
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1724
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD520ca69bace1bd0aa4cc2af821fd4f54e
SHA1032ac8a184df61a0adad4d13f42472ae4c7c7860
SHA25664cd7802b4c7e5f32d8e59d46aa8f98824b16f3cf5fb47be12aa8b38c19a7599
SHA512054f4868c615651789e74aa793b25737a8b5dfe4439a43a120b2dc2bc0c3e155d0a15ad1868c7e685b3a0d6e2559c9798e89eeaeed025c39ab0a0c2b10f31fd5
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD59cdcf02f847ddde1f3b62c676c5cc737
SHA11e28bc7716cb6adb55b1b397dbabbe31adba3cf2
SHA256d7726cc05bcd788912a23fc85f233775da28cb0d4d2920c2be66e5cc69e2b7ae
SHA512438303dceafa36ac40271d6b7759248357109cc479a53dd4eb472ab35d51f333f629be2da54fc113bcdcf2bb4bdf4201b5075351842d20d7e818c80a31b88e92
-
Filesize
41KB
MD52f87d51a25727565f97919c6e256755e
SHA17c52eede6d9acc8aa9ffe9a2a6d0b5826236bd87
SHA256e55f04bee4d38617f02100199e9e1d3a59fc056fec42f176f0bdd57b30ef0da8
SHA5124bfef26ba56ce3dde64447c59f880c590bc42c351d2bfabd0ab55a26ac4e022c1a309bb0d46206a569f35484e5f126a212f6f0379a2b57588413dfdfd76010da
-
Filesize
24KB
MD5b48fe5cc1b4805a0a54e631f6deb26c9
SHA17cfaa63997bcf66c044dc3b0aa20d8cedb169d83
SHA2569742586ce18a7c276f942a6b41a08cfb5144f89145c1249ac4e44076b6212185
SHA5125c00e4f15a3b0d5894e3fb88225930ed66b0e155ac5e6cfe8edfe80bf741de8311ae01bcff339974cf0dabc1663c87dbb45989310c270d6432ab550125078845
-
Filesize
700KB
MD5ac3e2f16df5b8e004bc7528957957c95
SHA1318dfb96abdc8e9d3778788dfdbb1f3dba885fba
SHA256c53ac431faed8f5ab7c67b254f913efe0dceaafdbf26b02b930d07f45d840fe2
SHA5124c60d3b255c38807a104e4362493dbf651fb8893633e94ee9a4c69770773f8d7bf95d310051154b9bd74d6eb1993626a5eb107e74e891d681f0398c64a7ebaf4
-
Filesize
1KB
MD57bab57cf68ec8b5eb3bc7397a3915ff1
SHA185c4f9b51d9e03b53d8c04e93f84bdff89a811f8
SHA256979344d0a3cd449f5766d5215bf6b1e3023cb3acd43c5eff1a4905e5d628eee4
SHA51291fe2430a8f4ab18e86291e5063cd7e71648895a06b15034789e5e9656bede9b66a96a62b85322f2880e502a90b14dd4908dd2b2547b2519c40dac94b0330946