Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 16:50
Behavioral task
behavioral1
Sample
f1867135922b673c84c9297b96a69898_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1867135922b673c84c9297b96a69898_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f1867135922b673c84c9297b96a69898_JaffaCakes118.exe
-
Size
16KB
-
MD5
f1867135922b673c84c9297b96a69898
-
SHA1
1720248f3b8c6d95eae222035ed0705e61928f24
-
SHA256
cf36b64b0c58827f334917cdb1b32bb7c35273aba42ef437b727bdd4c14ac763
-
SHA512
6f1a85b00db1414dce524a3ab9c0f25a94d721472806a961b3d2245f325b385078f450acfffb1f1ed3ee66ec7accd6aaaea0e8e4f2016247cfb1d7f1c9b3d697
-
SSDEEP
384:ix/cvr8X3yObbPBZkBxA2ox7G05XTwCcjP08Jl:iTX3rUBS7G0pwCCP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2904 dload.exe -
Loads dropped DLL 2 IoCs
pid Process 2840 f1867135922b673c84c9297b96a69898_JaffaCakes118.exe 2840 f1867135922b673c84c9297b96a69898_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2840-2-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\system32\\f1867135922b673c84c9297b96a69898_JaffaCakes118.exe" f1867135922b673c84c9297b96a69898_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\system32\\f1867135922b673c84c9297b96a69898_JaffaCakes118.exe" f1867135922b673c84c9297b96a69898_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\f1867135922b673c84c9297b96a69898_JaffaCakes118.exe f1867135922b673c84c9297b96a69898_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\f1867135922b673c84c9297b96a69898_JaffaCakes118.exe f1867135922b673c84c9297b96a69898_JaffaCakes118.exe File created C:\Windows\SysWOW64\dload.exe f1867135922b673c84c9297b96a69898_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2904 2840 f1867135922b673c84c9297b96a69898_JaffaCakes118.exe 28 PID 2840 wrote to memory of 2904 2840 f1867135922b673c84c9297b96a69898_JaffaCakes118.exe 28 PID 2840 wrote to memory of 2904 2840 f1867135922b673c84c9297b96a69898_JaffaCakes118.exe 28 PID 2840 wrote to memory of 2904 2840 f1867135922b673c84c9297b96a69898_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1867135922b673c84c9297b96a69898_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1867135922b673c84c9297b96a69898_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\dload.exeC:\Windows\system32\dload.exe2⤵
- Executes dropped EXE
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5c3d8edf9a3ab92def3d4136209b1f6ba
SHA1b6b9b0e31990ea96ce1da3a434a5e62569725a61
SHA2563b0644c347431b208d2b56135da6fc59ec268f340f07320faa3406c5a01a82b7
SHA5122f361f3f86f2179e8572bb66abb51feba49ddb4771a37fff316a73ac5ab2bf1ccee2ca55e642072c65f305880f0fad955c1b5f66beaf0707aaae1bb80bc5def2