Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe
-
Size
388KB
-
MD5
f766393d13d965c1c7596cd17349e37b
-
SHA1
e0862539e209498bd204eff93e26a86a49650c91
-
SHA256
c33d9bbc6f50434a98b2d4b4c9a88492842926fd543b04e2b3514fa9822f390a
-
SHA512
a7470995260cdeb8c2e3620c07e9e11d14d8b420eff12a05273d75810ae99e3ec3677bee8eada203f62923560442124212d3bd54ba8740b0576abbb3e38c8be1
-
SSDEEP
6144:INTsItWNWAi7QjFbu4TnBWnKqgKjgc6fzKX7zKv23yV36fW9dGkMYv68yc:clWMAiIbz0KqLKuXXKuLfWbvq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2664 bE01836BkOnE01836.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 bE01836BkOnE01836.exe -
Loads dropped DLL 2 IoCs
pid Process 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2936-3-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2936-16-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2664-23-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2664-27-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2664-36-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\bE01836BkOnE01836 = "C:\\ProgramData\\bE01836BkOnE01836\\bE01836BkOnE01836.exe" bE01836BkOnE01836.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main bE01836BkOnE01836.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe Token: SeDebugPrivilege 2664 bE01836BkOnE01836.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2664 bE01836BkOnE01836.exe 2664 bE01836BkOnE01836.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2664 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2664 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2664 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe 28 PID 2936 wrote to memory of 2664 2936 f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\ProgramData\bE01836BkOnE01836\bE01836BkOnE01836.exe"C:\ProgramData\bE01836BkOnE01836\bE01836BkOnE01836.exe" "C:\Users\Admin\AppData\Local\Temp\f766393d13d965c1c7596cd17349e37b_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD51bf2cd0f185c8f8d8be803046b07328c
SHA1ba8ed8926c6d2c4ebe00efd1110ff966fbff274c
SHA2569d1272f18328b8a9f52f4f8a92c94d271b84aae213449a88e68816836658de3d
SHA512671347fe369a39abbf34f80b7e87b2e3309418e7e72e0fc62ed412c1a24df2c0f91ef9396ebeb957e7ac1c8181c3049d6d4d8710282c1e7640a05636373b6199
-
Filesize
388KB
MD57943388bf23a0d562cbf27e212cfe84e
SHA10bf60a603ed7bba34d89bdcffbc96227b0165ea4
SHA256a6ad9a706165728d952d681f8351d211e423a52af2def7c874c6c697ae4b1b82
SHA51293842255a9b1012b5bb608aa1913225e454e66aff2fc89f8ad2933d3e8a81e280bde08ea387606692302b1392f4b58deba299c02d529cff33fc419dda9ff7406