Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe
-
Size
55KB
-
MD5
f8845878c87ff2223e4cf569b5f49c9e
-
SHA1
8b37ef90a1e248b420fb565bff8b507b69ea2d8d
-
SHA256
d152061bf7d3e5fe13f2420a8a05fef6a5d63097383cf7054bf91be75b6404b7
-
SHA512
dbd3e497d33a4b72c70ae12f74749f95e3b376fde4de112cbd86cb6def16591b0da02aa7dbd7944d53f42b13cf7f068c3742509e3e65fecdcc6f93dcd5235aa0
-
SSDEEP
768:8cv+EQGtmz8coupvmxT90hdpX2mwgnZP+1H+fktVU2kjg70qMqf/1H5qXdnhK:8tctmnouhmxT2haJgF2swHvlq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1444 Efjlgmlf.exe -
Loads dropped DLL 6 IoCs
pid Process 1908 f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe 1908 f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Efjlgmlf.exe f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Efjlgmlf.exe f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe File created C:\Windows\SysWOW64\Kgngnl32.dll f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2956 1444 WerFault.exe 28 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgngnl32.dll" f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1444 1908 f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1444 1908 f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1444 1908 f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe 28 PID 1908 wrote to memory of 1444 1908 f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe 28 PID 1444 wrote to memory of 2956 1444 Efjlgmlf.exe 29 PID 1444 wrote to memory of 2956 1444 Efjlgmlf.exe 29 PID 1444 wrote to memory of 2956 1444 Efjlgmlf.exe 29 PID 1444 wrote to memory of 2956 1444 Efjlgmlf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8845878c87ff2223e4cf569b5f49c9e_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Efjlgmlf.exeC:\Windows\system32\Efjlgmlf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 1403⤵
- Loads dropped DLL
- Program crash
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5b46b40c72334a697e95cc55c9b8b7652
SHA19f5240b1e01f9e6dd4835673931710db7df25def
SHA256d585c202e877c0386165ef3f8b7801bb28346e959c01cf83470bdfabc4915b43
SHA512f414fe48eac96802a5a45cdd236e1f2bdc200a39af572e526a90841d411491ad02799de984f75833bb8c0ff49e056fb521b512a0f43dcecb56f9bc10f8e11d9e