Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 21:16
Behavioral task
behavioral1
Sample
f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
f8c439364ab51bfa3941ef122d841bce
-
SHA1
e0a11389693f4d43cbadbc483c21abfc8e29f41d
-
SHA256
6ac8d4407a09763016358811a30a24fc17e2c95f6e42ec98fdcb39038ab5d36c
-
SHA512
830440edc1e9347726a308eaba368b8064931135ce61bd65e9992db38f2e01954dde97858dc0c13cf60ee9e0495216390958e17410cb38ee6fe74b425141b678
-
SSDEEP
12288:tEr6bkpYN2jF7vQZmSohg+k7j6aDG4FuA6lpgTIJcqBZ5Y6:tcykpY5852j6aJGl5cqB7
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 2500 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2600 qebyc.exe 2372 leqyqe.exe 1692 byxoi.exe -
Loads dropped DLL 5 IoCs
pid Process 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 2600 qebyc.exe 2600 qebyc.exe 2372 leqyqe.exe -
resource yara_rule behavioral1/files/0x000c0000000140f7-39.dat upx behavioral1/memory/1692-53-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/2372-44-0x0000000003960000-0x0000000003AF9000-memory.dmp upx behavioral1/memory/1692-58-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe 1692 byxoi.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2600 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2600 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2600 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2600 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 28 PID 2904 wrote to memory of 2500 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2500 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2500 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2500 2904 f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe 29 PID 2600 wrote to memory of 2372 2600 qebyc.exe 31 PID 2600 wrote to memory of 2372 2600 qebyc.exe 31 PID 2600 wrote to memory of 2372 2600 qebyc.exe 31 PID 2600 wrote to memory of 2372 2600 qebyc.exe 31 PID 2372 wrote to memory of 1692 2372 leqyqe.exe 34 PID 2372 wrote to memory of 1692 2372 leqyqe.exe 34 PID 2372 wrote to memory of 1692 2372 leqyqe.exe 34 PID 2372 wrote to memory of 1692 2372 leqyqe.exe 34 PID 2372 wrote to memory of 1572 2372 leqyqe.exe 35 PID 2372 wrote to memory of 1572 2372 leqyqe.exe 35 PID 2372 wrote to memory of 1572 2372 leqyqe.exe 35 PID 2372 wrote to memory of 1572 2372 leqyqe.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8c439364ab51bfa3941ef122d841bce_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\qebyc.exe"C:\Users\Admin\AppData\Local\Temp\qebyc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\leqyqe.exe"C:\Users\Admin\AppData\Local\Temp\leqyqe.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\byxoi.exe"C:\Users\Admin\AppData\Local\Temp\byxoi.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:1572
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5b4d653fe8820635cd7ae2cc964d4de79
SHA10ef24ea89f39bbe6832ada61c3a1e6e9c90bc9e6
SHA256fa5f66899f219cbf011599ab091ea254f219347520729e5be1787917ede6d1d6
SHA512f96e0bc879e3db069224f693678fd9af8662f911e1153090c48ac2422a296bdad749018c1c6ece844752fa32105f9b8d83bbd0932c67c8289e3b9ebea1c76d73
-
Filesize
304B
MD5238bedb301740a6e20d1328d51c138b0
SHA188f697e5f6e98f9af8d22ffed9e5775b9188fd69
SHA25643011cd60d205101282269504a949d791588e8bd8a83611f8357b7ebb75b803d
SHA5120fb7472704d7293f6955d42071acbe1396e2a5d7134f910ea19a4103ff6a6597ae1da4df5255f66e70a088b8ca0f86981ea56ba76b09707467f7baec943212a1
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD55fcfa4f2cedf773552d03d021cd62652
SHA1541e345d8425925d1d524f45f77a7dc31d6f1e52
SHA2568943094731ec8821a19cd66495ac027b843fc32df6ffa7b9d56ebb8dc776fa75
SHA5128b6144b16fa1a295bfc47d7aa2a1064a0ede6cc458ced522fc06f05a961e0de1422009defbb59a125051d9c6a7f3f53bbc5e7936a15eedf713d4ee1e22928354
-
Filesize
459KB
MD533e49748dcca9e8f1b90e4c194f85d3f
SHA1e94fe47e4d9d6abf036634e258f7cb62b25ada7c
SHA256ac61ff714605aa4d3bca551b2cbf9197e078cf1025ebda378b3169d136f439b4
SHA512251a2a35d804d90ffcc955d309ed5343cfa1e729d7907ebaa23c318c5327b82db3a28f02e4d8824e94dc8c74d07192becf458388b9b27ccaf011026affd57e3b
-
Filesize
1.1MB
MD57ff92bb7054202476ceb4d36b30a0440
SHA1869c5d3f8ae66ba88ca32370936628cde5cb9f5a
SHA256adceea0ab27efc287d4cc8b80f9ddfbff1ff9bb9942fed8e9e112674c19de53a
SHA512cb7d85f081cba7b4a4f4c1a71c44781fd11ed4298886efaf382ae047d0698956dc692a9a55eb077774be0085172bf89779130cdfbda2b599f74782b3ed9d786d