Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$TEMP/arpa.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$TEMP/arpa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/http_dll.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/http_dll.dll
Resource
win10v2004-20240412-en
General
-
Target
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
-
Size
125KB
-
MD5
fba356748c02da7a65ddef9470aa1cf2
-
SHA1
e0e3b538d015b1eb06a8a663bc746a36c3cc5848
-
SHA256
792eba5ba91a52bfb3b369107f38fb9a7e7b7987cd870f465338eae59e81f3f6
-
SHA512
f626824b33ea03f690500058c73ba662a1363535f80e7b05149dc8b580bd6bf514b334f3509283933993d0947b254c30cb6ddbf7be99d53de471997a2ef2f71d
-
SSDEEP
3072:DQIURTXJ+MSx7NqlTE6jSOJH9deWpA9+MlScvohy8oAYS0tzgv:Ds9Sx7NqRz9In+Ml1vob6dtK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3032 arpa.exe 2616 unsecapp.exe -
Loads dropped DLL 6 IoCs
pid Process 3020 rundll32.exe 3020 rundll32.exe 3032 arpa.exe 3032 arpa.exe 3032 arpa.exe 2616 unsecapp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3020 2012 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 28 PID 2012 wrote to memory of 3020 2012 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 28 PID 2012 wrote to memory of 3020 2012 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 28 PID 2012 wrote to memory of 3020 2012 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 28 PID 2012 wrote to memory of 3020 2012 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 28 PID 2012 wrote to memory of 3020 2012 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 28 PID 2012 wrote to memory of 3020 2012 fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe 28 PID 3020 wrote to memory of 3032 3020 rundll32.exe 29 PID 3020 wrote to memory of 3032 3020 rundll32.exe 29 PID 3020 wrote to memory of 3032 3020 rundll32.exe 29 PID 3020 wrote to memory of 3032 3020 rundll32.exe 29 PID 3032 wrote to memory of 2616 3032 arpa.exe 30 PID 3032 wrote to memory of 2616 3032 arpa.exe 30 PID 3032 wrote to memory of 2616 3032 arpa.exe 30 PID 3032 wrote to memory of 2616 3032 arpa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\arpa.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\arpa.exe"C:\Users\Admin\AppData\Local\Temp\arpa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe"C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD528c6f235946fd694d2634c7a2f24c1ba
SHA1e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5
SHA256c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763
SHA51216865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be
-
Filesize
81KB
MD527a4ed145a9a6cb41af09b8927fd5bee
SHA1815be32e1ae7ec20621e87239a6279fbba2fc8b5
SHA2563fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10
SHA5122978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8
-
Filesize
20KB
MD55b92266d9a26260b4c9920ede267ba37
SHA1372d5455fdb689787e7e49f7799510c6c2cdf6b7
SHA256d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261
SHA512db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5