Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 08:12
Behavioral task
behavioral1
Sample
f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe
-
Size
15KB
-
MD5
f9e2534631ebb9a7eb85fd9134488afc
-
SHA1
3c43c5ff22b073ec7c8f03b9b4dc39ce4af3eddb
-
SHA256
c1b08110a9266287255a3d88abac9c354d0bed6d4b04a3c90bb15e8d03d95b67
-
SHA512
7186a4828c2f494cae482a1c8064057700a322303e9cdd61b6283a4593e01077ddf9f6197aa62e2efe3081a94a877fa830250ebc49d64e3fbfe9215947b64350
-
SSDEEP
384:Q+PLx9vesjJ9eRxI+q+hGVIfXen9Qpla0/VblgGP8:BPNcwQDqv4TTHFlFE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2636 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 Win32Debug.exe -
Loads dropped DLL 2 IoCs
pid Process 2636 cmd.exe 2636 cmd.exe -
resource yara_rule behavioral1/memory/1908-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1908-10-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000c000000012262-12.dat upx behavioral1/memory/2636-13-0x0000000000130000-0x000000000013F000-memory.dmp upx behavioral1/memory/2936-17-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2936-18-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\Win32 Debug Manager = "C:\\Windows\\system32\\Win32Debug.exe" f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Win32 Debug Manager = "C:\\Windows\\system32\\Win32Debug.exe" Win32Debug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\Win32 Debug Manager = "C:\\Windows\\system32\\Win32Debug.exe" Win32Debug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Win32 Debug Manager = "C:\\Windows\\system32\\Win32Debug.exe" f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Win32Debug.exe f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Win32Debug.exe f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Win32Debug.exe Win32Debug.exe File created C:\Windows\SysWOW64\Win32Debug.exe Win32Debug.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2636 1908 f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2636 1908 f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2636 1908 f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2636 1908 f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe 28 PID 2636 wrote to memory of 2936 2636 cmd.exe 30 PID 2636 wrote to memory of 2936 2636 cmd.exe 30 PID 2636 wrote to memory of 2936 2636 cmd.exe 30 PID 2636 wrote to memory of 2936 2636 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9e2534631ebb9a7eb85fd9134488afc_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c rs.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Win32Debug.exeC:\Windows\system32\WIN32D~1.EXE3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD51df9c4b1f85368a67e273cb6689faab0
SHA16bdefb85d87bad7b26f2382f4b35d22ed62812d4
SHA2563cb805da58017ddbc9038fd7b45599ce9baaa0571f53223ef535688f21d70175
SHA512f48037a9ce0376525775e62e86fb828381674fa01dc559c5a6514eaf2f10ef36f05230167319666d32b88df8d8447e86ada34fcca76aa9795ea86806cf03318d
-
Filesize
15KB
MD5f9e2534631ebb9a7eb85fd9134488afc
SHA13c43c5ff22b073ec7c8f03b9b4dc39ce4af3eddb
SHA256c1b08110a9266287255a3d88abac9c354d0bed6d4b04a3c90bb15e8d03d95b67
SHA5127186a4828c2f494cae482a1c8064057700a322303e9cdd61b6283a4593e01077ddf9f6197aa62e2efe3081a94a877fa830250ebc49d64e3fbfe9215947b64350