Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe
-
Size
271KB
-
MD5
f6398be837e5dfebfc7f7a5c2dc20345
-
SHA1
a84eec10b297355930524fc4ce5e8b4fe6f50806
-
SHA256
8d772143b4313046d4cb32e31f4b3f589009a79916ab25ec3b5d1fe92ebbddfb
-
SHA512
ebba31e095c61f8b826425f02777630422ca7e415fa5dcdd1f0a577b0142fb29cec43ccc7e69532bdcee106e1d798be952fd5dbcf30ff9de77cc0639f018007e
-
SSDEEP
6144:q+FNvDu5NMsd+mF9gNMrhsgRx2aHNs8DtD1SpUxD:lFxDAdMmF94KZJ+i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 72d359509d3a434d.exe -
Executes dropped EXE 2 IoCs
pid Process 3040 72d359509d3a434d.exe 2764 72d359509d3a434d.exe -
Loads dropped DLL 3 IoCs
pid Process 2944 f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe 2944 f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe 3040 72d359509d3a434d.exe -
resource yara_rule behavioral1/memory/2944-9-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2944-4-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-11-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-15-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-73-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-74-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-75-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-76-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-77-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-78-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-79-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-80-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-81-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-82-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-83-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-84-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-85-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-87-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-86-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-89-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-88-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-91-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-90-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-152-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-153-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-154-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-155-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-156-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-157-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-158-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-159-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/3040-160-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2764-161-0x0000000000400000-0x0000000000541000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Health Monitoring Service Pro = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\72d359509d3a434d.exe\"" 72d359509d3a434d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*System Health Monitoring Service Pro = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\72d359509d3a434d.exe\"" 72d359509d3a434d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\System Health Monitoring Service Pro = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\72d359509d3a434d.exe\"" 72d359509d3a434d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*System Health Monitoring Service Pro = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\72d359509d3a434d.exe\"" 72d359509d3a434d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3040 2944 f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe 28 PID 2944 wrote to memory of 3040 2944 f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe 28 PID 2944 wrote to memory of 3040 2944 f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe 28 PID 2944 wrote to memory of 3040 2944 f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe 28 PID 3040 wrote to memory of 2764 3040 72d359509d3a434d.exe 29 PID 3040 wrote to memory of 2764 3040 72d359509d3a434d.exe 29 PID 3040 wrote to memory of 2764 3040 72d359509d3a434d.exe 29 PID 3040 wrote to memory of 2764 3040 72d359509d3a434d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\72d359509d3a434d.exe:*C:\Users\Admin\AppData\Local\Temp\f6398be837e5dfebfc7f7a5c2dc20345_JaffaCakes118.exe *2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\72d359509d3a434d.exea ZZZZZZWZVZG3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
271KB
MD575212f326be3f0ab75af87b0f8fbe6fa
SHA133dfee226899e0041ddc18c840926e2abbfe0e48
SHA2568ffd75394655af2219d6f6f6b3aab05014b043f93ab6ce92a5b97778bab3064f
SHA512541907a8919dc171b334484ea1ae83fcbfb7ff699fc9e3afd24987524dd4d82c4b2acb3494e09c4ceebee063e3b4900156ef4e5a62916a20af035eb8cccd76e4
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a