Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe
-
Size
313KB
-
MD5
f74da4cb58be5d38de0d5da1286d336d
-
SHA1
ad66a2c16165182a1efe56f712419195ff073512
-
SHA256
e72b0c789aae217b0bbc575361c3ce1bb7ecda572e8fc023825d86020040e2dc
-
SHA512
1fd91d888528eee1a44ebb2add18530859928ac3b3c25d9d072c5ca6a36e30ce555a691902b6161f17db1a29aeea210e6f96ccb9caca1fd7b2a836c71c0342f2
-
SSDEEP
6144:tz5K14o/r+O7+1RKXrHJk5UXkalaqq8+8gXmgGVyuD1G0IUJmqHafm:TK/S/2XrHJmR8NgGouRNBsqHem
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1516 iNeMdEc07000.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 iNeMdEc07000.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe 2384 f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2384-1-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2384-3-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2384-4-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2384-5-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/1516-22-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2384-23-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/1516-26-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/2384-37-0x0000000000400000-0x00000000004B2000-memory.dmp upx behavioral1/memory/1516-38-0x0000000000400000-0x00000000004B2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iNeMdEc07000 = "C:\\ProgramData\\iNeMdEc07000\\iNeMdEc07000.exe" iNeMdEc07000.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iNeMdEc07000.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2384 f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe Token: SeDebugPrivilege 1516 iNeMdEc07000.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1516 iNeMdEc07000.exe 1516 iNeMdEc07000.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1516 iNeMdEc07000.exe 1516 iNeMdEc07000.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1516 iNeMdEc07000.exe 1516 iNeMdEc07000.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1516 2384 f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe 28 PID 2384 wrote to memory of 1516 2384 f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe 28 PID 2384 wrote to memory of 1516 2384 f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe 28 PID 2384 wrote to memory of 1516 2384 f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\ProgramData\iNeMdEc07000\iNeMdEc07000.exe"C:\ProgramData\iNeMdEc07000\iNeMdEc07000.exe" "C:\Users\Admin\AppData\Local\Temp\f74da4cb58be5d38de0d5da1286d336d_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313KB
MD56288304eecfd70091fac565c498a7032
SHA18d9e2b5d6924647dd67e95734e6e0032ae62b159
SHA25637056305e6fe145346fe20f4a03881a62e7c0a6e35fec929e70efff7fa0e3bab
SHA5128dc16be5a579b33d4386f8e6b29135f6c8bcbb51ccbbd65a31fc26aa9dbd649b75969a6f40e0e4f223f70e0f35bde0b52aa465c5d7b742539a3169e15dedf375