Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe
-
Size
24KB
-
MD5
f0b3906d92d785ec3868b0b69a31ccff
-
SHA1
109aad2a5e25c308c1e3cb241631b2c7e2dcae15
-
SHA256
6ca3f655fda378cd302b42168363c61d214c4d9a6ba724f79eff9f6f91373baf
-
SHA512
cad3a331a18bfb6aac33c5eca0859c38f2591efdb20dc56df926a94477de6aab1e121fa0427412c8e153b0e951a1a144c31b61ad87494b034c0293eafcc3a2c8
-
SSDEEP
384:E3eVES+/xwGkRKJIitlM61qmTTMVF9/q5l0:bGS+ZfbJltO8qYoAq
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2560 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2524 ipconfig.exe 2636 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2560 tasklist.exe Token: SeDebugPrivilege 2636 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1444 f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe 1444 f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2512 1444 f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe 28 PID 1444 wrote to memory of 2512 1444 f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe 28 PID 1444 wrote to memory of 2512 1444 f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe 28 PID 1444 wrote to memory of 2512 1444 f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe 28 PID 2512 wrote to memory of 2972 2512 cmd.exe 30 PID 2512 wrote to memory of 2972 2512 cmd.exe 30 PID 2512 wrote to memory of 2972 2512 cmd.exe 30 PID 2512 wrote to memory of 2972 2512 cmd.exe 30 PID 2512 wrote to memory of 2524 2512 cmd.exe 31 PID 2512 wrote to memory of 2524 2512 cmd.exe 31 PID 2512 wrote to memory of 2524 2512 cmd.exe 31 PID 2512 wrote to memory of 2524 2512 cmd.exe 31 PID 2512 wrote to memory of 2560 2512 cmd.exe 32 PID 2512 wrote to memory of 2560 2512 cmd.exe 32 PID 2512 wrote to memory of 2560 2512 cmd.exe 32 PID 2512 wrote to memory of 2560 2512 cmd.exe 32 PID 2512 wrote to memory of 2692 2512 cmd.exe 34 PID 2512 wrote to memory of 2692 2512 cmd.exe 34 PID 2512 wrote to memory of 2692 2512 cmd.exe 34 PID 2512 wrote to memory of 2692 2512 cmd.exe 34 PID 2692 wrote to memory of 2680 2692 net.exe 35 PID 2692 wrote to memory of 2680 2692 net.exe 35 PID 2692 wrote to memory of 2680 2692 net.exe 35 PID 2692 wrote to memory of 2680 2692 net.exe 35 PID 2512 wrote to memory of 2636 2512 cmd.exe 36 PID 2512 wrote to memory of 2636 2512 cmd.exe 36 PID 2512 wrote to memory of 2636 2512 cmd.exe 36 PID 2512 wrote to memory of 2636 2512 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0b3906d92d785ec3868b0b69a31ccff_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2972
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2524
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2680
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD56fc8b7b1ac63b425556153c00b5a088a
SHA1ac349599aa2e827c0de1fd94ed797ed7ac4a7f77
SHA256a0c960377a955a67f9ee49a50db48864c9d30ac96f859ba489af7b4bd87d44c6
SHA512fdf97f6b38f52c8792675ff3b1eb214c2627f71f8cd98b15de6c4255ff11b214bcdfbfc22c61996d8410234f51243b20515c8101306c3828be594461171236d6