Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe
-
Size
14KB
-
MD5
f563a3085f5ac282e858b3fd48f0f076
-
SHA1
9ff0bac4985b24c5712a499f67b5815290fe4ecf
-
SHA256
20b5e5b6849ad2417cdbd147abbc378672014dac6c0acc51e5c07ad4ebc78661
-
SHA512
127962aa7c36cdbea853e4404cc6e24c13a9a7b569ae1d4b0e57f6f4cfade4e17ac864c5c1c9db79af712ae34f3533f00bcb09d9e4dcc2334fcbb4a51c0d18ab
-
SSDEEP
384:qqPKe+NmiOtoCOQFuZqhYE1Ff4z+K6/2tAMOGa:qTHmiOtDOQD7DfmEz
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vebicxng.dll = "{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}" f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\vebicxng.tmp f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vebicxng.tmp f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vebicxng.nls f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}\InProcServer32 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}\InProcServer32\ = "C:\\Windows\\SysWow64\\vebicxng.dll" f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE}\InProcServer32\ThreadingModel = "Apartment" f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6B9FEAD7-4319-4312-AB05-D8C9CD255BFE} f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2672 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe 28 PID 2820 wrote to memory of 2672 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe 28 PID 2820 wrote to memory of 2672 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe 28 PID 2820 wrote to memory of 2672 2820 f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f563a3085f5ac282e858b3fd48f0f076_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7C80.tmp.bat2⤵
- Deletes itself
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5e4804551569169699b7ee912edfb75e8
SHA12552170de58223995ddf5743942990ffcb56f00a
SHA256835a48b29b4d3313051d47813fefce5a3ec55747e64acdc1dd437e502f3a5e8b
SHA512169155bb2b5aa4e9bf8b8e9bb21b87cc3dda93c864a175d7f9080ab7b26847c134d5676ac0bb3c90ab5b8c0a66a5dd13cf51b45f4d7eb3afc2a4117e56651b07
-
Filesize
428B
MD53d704389844f722042858e93ffb3bdeb
SHA1325a82a71da4b8d9ddbde44cac9929e84af43ccb
SHA25647e2996c1cf6f4a0d91469cb0524d9e76fa3117ddcbeeebe46700dc8695b1dfd
SHA5123bc7ba549b97b6e3f3b7bb85ffbf030ea03460fe1be824fc22319b07f2548cb5aee6efc9ff1be3b366db370c377e21a958c8e02e9199f22dd9d862181327a716
-
Filesize
2.2MB
MD556af05a61e260ed71d005449220d02db
SHA1c4aa2ff36c80a6f480377954775ee35f7041c708
SHA2561426a41a901110e189f470528712e1e373b01d7398380bac46b98171721dc49b
SHA512c0d471b9563f60a67e5d2e344de95c2e97e490a22f10609529d347dd0d584610edcbc0f40fa533afcb58a8f144ee5ac59d4f07fe9850f7756fa984c84eff4eae