Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe
-
Size
262KB
-
MD5
f50daea0f91ca14c0a2e7e6bdc7aeb5a
-
SHA1
5f1ce89e0a82a2e0ee31b34718fd3c11ce77c291
-
SHA256
0a44ba9311a34cae9a0d46485e3ea4a1083e540d5fbf0320fe948e91930069c1
-
SHA512
44fe4d0e526e212011d980645c779bb277217b9621aceeeb68503c9c33ec62cbd23a76c5d4a1f0cb0eb1f7523f168ebd4664cb926503ea8098a76c60881d8c18
-
SSDEEP
6144:3GyQPie7lM9GFdERtFSqX7tNfVXVHQLIiu8cfo0/pW:3GVPiey7pSwZGEX8cA0/M
Malware Config
Extracted
smokeloader
pub3
Extracted
smokeloader
2020
http://directorycart.com/upload/
http://tierzahnarzt.at/upload/
http://streetofcards.com/upload/
http://ycdfzd.com/upload/
http://successcoachceo.com/upload/
http://uhvu.cn/upload/
http://japanarticle.com/upload/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 1208 -
Executes dropped EXE 1 IoCs
Processes:
wjahgbspid process 2548 wjahgbs -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
wjahgbsf50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wjahgbs Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wjahgbs Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wjahgbs -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exepid process 2148 f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe 2148 f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exewjahgbspid process 2148 f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe 2548 wjahgbs -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2568 wrote to memory of 2548 2568 taskeng.exe wjahgbs PID 2568 wrote to memory of 2548 2568 taskeng.exe wjahgbs PID 2568 wrote to memory of 2548 2568 taskeng.exe wjahgbs PID 2568 wrote to memory of 2548 2568 taskeng.exe wjahgbs
Processes
-
C:\Users\Admin\AppData\Local\Temp\f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f50daea0f91ca14c0a2e7e6bdc7aeb5a_JaffaCakes118.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2148
-
C:\Windows\system32\taskeng.exetaskeng.exe {565D16DA-F7D6-4DF3-8AC4-0C1FD67F3291} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\wjahgbsC:\Users\Admin\AppData\Roaming\wjahgbs2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5f50daea0f91ca14c0a2e7e6bdc7aeb5a
SHA15f1ce89e0a82a2e0ee31b34718fd3c11ce77c291
SHA2560a44ba9311a34cae9a0d46485e3ea4a1083e540d5fbf0320fe948e91930069c1
SHA51244fe4d0e526e212011d980645c779bb277217b9621aceeeb68503c9c33ec62cbd23a76c5d4a1f0cb0eb1f7523f168ebd4664cb926503ea8098a76c60881d8c18