Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
f7497b99bdadd106d121e30373890513_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7497b99bdadd106d121e30373890513_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7497b99bdadd106d121e30373890513_JaffaCakes118.exe
-
Size
231KB
-
MD5
f7497b99bdadd106d121e30373890513
-
SHA1
9eaed2467e9ff2d1683e3696e1172eab45b96c53
-
SHA256
e1a2a70d0116c68296edc9c52b5d23bf5c0922893d8f623a3ead47283a6a781e
-
SHA512
725c2bf34e7592a77311097bde179673914f0d37975b3df388878663fa9eae70e82a62cc82db32e67fbdbf45c6473b83af376b90a591815025b32c26b360a649
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/B8FkgnYHfQlAF:o68i3odBiTl2+TCU/Ak8KfQlEh
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" f7497b99bdadd106d121e30373890513_JaffaCakes118.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon13.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File opened for modification C:\Windows\winhash_up.exez f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon6.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon12.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon3.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon10.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon14.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon5.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon7.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\bugMAKER.bat f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\winhash_up.exez f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\winhash_up.exe f7497b99bdadd106d121e30373890513_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon2.ico f7497b99bdadd106d121e30373890513_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2556 2772 f7497b99bdadd106d121e30373890513_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2556 2772 f7497b99bdadd106d121e30373890513_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2556 2772 f7497b99bdadd106d121e30373890513_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2556 2772 f7497b99bdadd106d121e30373890513_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7497b99bdadd106d121e30373890513_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7497b99bdadd106d121e30373890513_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD5cd3029ff76fae35d11a8f147774c95c6
SHA1f26441af58820e05a2f4728e48b72daea70e9586
SHA256aaca0213ec760f585e2dd8ccefbef076f48e7632b65516e06f4adc8da66bd45b
SHA512aaf915bfd8f20ba86edd013ee0abf271b2aef90c38c442ce8c18da8137b51e6b3763efd3d9ea4199ab22f31c705cb249b5b6236c030f12c534d7c154d0772976