Analysis
-
max time kernel
157s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fba356748c02da7a65ddef9470aa1cf2_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$TEMP/arpa.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$TEMP/arpa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$TEMP/http_dll.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$TEMP/http_dll.dll
Resource
win10v2004-20240412-en
General
-
Target
$TEMP/arpa.exe
-
Size
95KB
-
MD5
28c6f235946fd694d2634c7a2f24c1ba
-
SHA1
e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5
-
SHA256
c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763
-
SHA512
16865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be
-
SSDEEP
1536:d4mHlQgfJA3DrnN6TU3W9bEuLJDuUVfwX9Gy5JE840gbDcCRDb9:dBFwrs9bb1VYXH5JE840Ax/9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
unsecapp.exepid process 1364 unsecapp.exe -
Loads dropped DLL 1 IoCs
Processes:
unsecapp.exepid process 1364 unsecapp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
arpa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionLYo = "\"C:\\ProgramData\\ESET Malware ProtectionLYo\\unsecapp.exe\" -app" arpa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
arpa.exedescription pid process target process PID 1028 wrote to memory of 1364 1028 arpa.exe unsecapp.exe PID 1028 wrote to memory of 1364 1028 arpa.exe unsecapp.exe PID 1028 wrote to memory of 1364 1028 arpa.exe unsecapp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\arpa.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\arpa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe"C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD527a4ed145a9a6cb41af09b8927fd5bee
SHA1815be32e1ae7ec20621e87239a6279fbba2fc8b5
SHA2563fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10
SHA5122978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8
-
Filesize
20KB
MD55b92266d9a26260b4c9920ede267ba37
SHA1372d5455fdb689787e7e49f7799510c6c2cdf6b7
SHA256d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261
SHA512db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5
-
Filesize
95KB
MD528c6f235946fd694d2634c7a2f24c1ba
SHA1e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5
SHA256c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763
SHA51216865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be