Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe
-
Size
452KB
-
MD5
f7e536d8df1eede6b51bacc10ab2b079
-
SHA1
f3142d0521616c744378b2b7d027079c445f2da8
-
SHA256
1411836fc4c17244713a666ded7eeb0da70651d61badf2586dddcbbee5699f80
-
SHA512
0570c84bd4ccbfc898733e29040c36a97bfa6361e3bf05b8515167fcd2c7da15baea6f22f5141d030bb7af9ce053e24996d58f2b5a660b8f299959186d3a98bb
-
SSDEEP
12288:7oYOio4IIW9Ww4aKD2DiVkgqLIaD5xRRjNoe:7oYJTd0u2XgCIu5PBf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2596 kN01813OcCmA01813.exe -
Executes dropped EXE 1 IoCs
pid Process 2596 kN01813OcCmA01813.exe -
Loads dropped DLL 2 IoCs
pid Process 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2948-1-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2948-17-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2596-20-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2596-30-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2596-40-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kN01813OcCmA01813 = "C:\\ProgramData\\kN01813OcCmA01813\\kN01813OcCmA01813.exe" kN01813OcCmA01813.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main kN01813OcCmA01813.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe Token: SeDebugPrivilege 2596 kN01813OcCmA01813.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 kN01813OcCmA01813.exe 2596 kN01813OcCmA01813.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2596 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe 28 PID 2948 wrote to memory of 2596 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe 28 PID 2948 wrote to memory of 2596 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe 28 PID 2948 wrote to memory of 2596 2948 f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\ProgramData\kN01813OcCmA01813\kN01813OcCmA01813.exe"C:\ProgramData\kN01813OcCmA01813\kN01813OcCmA01813.exe" "C:\Users\Admin\AppData\Local\Temp\f7e536d8df1eede6b51bacc10ab2b079_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD544c24db3fdd43de27dd2251cf0dcf560
SHA1fbac1fde7f65d09910d2c875da2febc567098fef
SHA256ab5ab8c710621261b4f047a5c02f98a90a4ccda9343c61b88d8b3e8e375c98d5
SHA51219777886388917598909feb0ab4d0c5f5844ff193352844fd4b2b363ae03edd3f30e8ec55dbf134060ddd1a579e6f32e72a91a9b8b9f1fe565b073c43cbe8dc5
-
Filesize
452KB
MD53728078ab0de394705c62bc011cffbec
SHA10bc0e962cf8ce230f9954cfe4904b07113619e98
SHA2564c9e4e34ec7372433e34ea3cb65a7f78ac7c6f74ee7cd2880228bd3b2377ebab
SHA512e5cb93b5148e8d03e0d8b2f8f677f57792da06f5e1c31726bc8bd24c20bb955123dfde3cbeaa2326812b90152579043898d8f8031fc4e7485b1d061fa85d229c