Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe
-
Size
232KB
-
MD5
f3dd298718e9cb80718273b2013a5002
-
SHA1
3cfdcad96c8f0aacb8afbc257f5ab6ae75b42511
-
SHA256
be26607002e534fd393f7037e54566f041c0fa08f2d2bd8d5c0668a739d10bd7
-
SHA512
1b3e011ed027972096217c5777a76f6a9395a4fddc72c748e3f0d134f356e783c0505435f1ba76f827944bcf45fd58b60aa3bb1231676a316407b1bdad6b1176
-
SSDEEP
6144:iZue0vvLUp4fqHUa5OugJykJbyP2X3nV8GNLF:iZdQL9Y5zeyanv9
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1904 birth00.bin.exe 3144 birth00.bin.exe 4620 W3Z6D8F.exe -
resource yara_rule behavioral2/memory/2988-2-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2988-4-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2988-5-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2988-6-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2988-7-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2988-8-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2988-10-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3144-30-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3144-33-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2988-40-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3144-49-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XA7DZZWA9UUU6WVIAMCMRBBSFG = "C:\\birth00.bin\\birth00.bin.exe" W3Z6D8F.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2600 set thread context of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 1904 set thread context of 3144 1904 birth00.bin.exe 87 -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Software\Microsoft\Internet Explorer\PhishingFilter W3Z6D8F.exe Set value (int) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" W3Z6D8F.exe Set value (int) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" W3Z6D8F.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Software\Microsoft\Internet Explorer\Recovery W3Z6D8F.exe Set value (int) \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" W3Z6D8F.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 3144 birth00.bin.exe 3144 birth00.bin.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe 4620 W3Z6D8F.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe Token: SeDebugPrivilege 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe Token: SeDebugPrivilege 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe Token: SeDebugPrivilege 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe Token: SeDebugPrivilege 3144 birth00.bin.exe Token: SeDebugPrivilege 3144 birth00.bin.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe Token: SeDebugPrivilege 4620 W3Z6D8F.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2600 wrote to memory of 2988 2600 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 83 PID 2988 wrote to memory of 1904 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 86 PID 2988 wrote to memory of 1904 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 86 PID 2988 wrote to memory of 1904 2988 f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe 86 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 1904 wrote to memory of 3144 1904 birth00.bin.exe 87 PID 3144 wrote to memory of 4620 3144 birth00.bin.exe 88 PID 3144 wrote to memory of 4620 3144 birth00.bin.exe 88 PID 3144 wrote to memory of 4620 3144 birth00.bin.exe 88 PID 3144 wrote to memory of 4620 3144 birth00.bin.exe 88 PID 3144 wrote to memory of 4620 3144 birth00.bin.exe 88 PID 4620 wrote to memory of 2988 4620 W3Z6D8F.exe 83 PID 4620 wrote to memory of 2988 4620 W3Z6D8F.exe 83 PID 4620 wrote to memory of 2988 4620 W3Z6D8F.exe 83 PID 4620 wrote to memory of 2988 4620 W3Z6D8F.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3dd298718e9cb80718273b2013a5002_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\birth00.bin\birth00.bin.exe"C:\birth00.bin\birth00.bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\birth00.bin\birth00.bin.exe"C:\birth00.bin\birth00.bin.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\W3Z6D8F.exe"C:\Users\Admin\AppData\Local\Temp\W3Z6D8F.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
232KB
MD5f3dd298718e9cb80718273b2013a5002
SHA13cfdcad96c8f0aacb8afbc257f5ab6ae75b42511
SHA256be26607002e534fd393f7037e54566f041c0fa08f2d2bd8d5c0668a739d10bd7
SHA5121b3e011ed027972096217c5777a76f6a9395a4fddc72c748e3f0d134f356e783c0505435f1ba76f827944bcf45fd58b60aa3bb1231676a316407b1bdad6b1176
-
Filesize
54KB
MD5f649ccdf326dc92ce1c5a38013e4da0c
SHA1e89dfa4ca712613d2273738c570e8e4ff1cd58d7
SHA2568634ecabfc6210ce49f42bea848974011dd967d24bc9f1fc087413060bd09af7
SHA512b1f8d27bfefa2208c22c035461a7cd5b8625e173f969a3662427ef89da5413ad0705e9ef14a746cbadac2965592d8080944a8177ecc09f5448fe80657a1a1154