Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 18:40
Behavioral task
behavioral1
Sample
f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
f888ddf97885f6950cfc69db48f45089
-
SHA1
eaca51225311315c70b88d6fd6a5eaf8b4e4c908
-
SHA256
90d28068d7dbfc8d38b1ad3cc81c0d179199c9c999ff9c486cd6d783f60b6ad0
-
SHA512
fb86ea1e51de57fbc230ae9ba6e7bc8e19a95f35e9a785c652b4cda775f4145e85bed83bd6d74ea3381b04ce4499e1939f1c297824e9bff61c4c7c351da7d523
-
SSDEEP
49152:hDzbaYeXe8IcakLz0ibq6yqhhubDY0CgOnQvEn0bcakLz0ibq6yqh:Rb9edIcakcibiqhMbMgOn7n0bcakcibJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2352 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2352-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001220d-11.dat upx behavioral1/memory/2976-18-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/memory/2352-15-0x0000000023210000-0x000000002346C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2352 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2976 2352 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2976 2352 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2976 2352 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2976 2352 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 29 PID 2976 wrote to memory of 2596 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2596 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2596 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2596 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 30 PID 2976 wrote to memory of 2664 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 32 PID 2976 wrote to memory of 2664 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 32 PID 2976 wrote to memory of 2664 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 32 PID 2976 wrote to memory of 2664 2976 f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe 32 PID 2664 wrote to memory of 2640 2664 cmd.exe 34 PID 2664 wrote to memory of 2640 2664 cmd.exe 34 PID 2664 wrote to memory of 2640 2664 cmd.exe 34 PID 2664 wrote to memory of 2640 2664 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f888ddf97885f6950cfc69db48f45089_JaffaCakes118.exe" /TN 6ek6uOO9da42 /F3⤵
- Creates scheduled task(s)
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\btuIm.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da424⤵PID:2640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55d5194409990f0de88bc0af10abdd27b
SHA101aa65d9102f2b4b70291585ec7243599a29e672
SHA256cbcf9741a5dc57f3342bd109869d40f490d1d4f8f76cc8686863194bc923a9c5
SHA512f76a42a4746d29bc45ac380169bcbe604919fbae453294f1df927c0a255d42c9e19092567e6c3b43050f1656813a83cf1c02f0b55496b787e588204bd6d2cbd5
-
Filesize
2.0MB
MD508bef371027eec1ad0a1229c941452bb
SHA108dec84492ffa788216815fb054d11cf1a75508c
SHA256791e61dec2853f2e2d7a6e1ee740c0fc1a7787471270e425e91769851f9f7f5d
SHA51248bf26d2e4d6ef1b359cfcdf060967c809b11dcdc3a8f9b4b380f89868ec74e850544509c89416fa3233179367298179d2826cff64f7d340199baa62fd3cb0b2