Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 08:05
Behavioral task
behavioral1
Sample
fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
fc4d7621230751a74cd05fe95545a88e
-
SHA1
98d1e5d86a1fba5798032af67182f63574123e05
-
SHA256
eea2bb97ee3d25a2e61f30a065ff69af1c56f1437e156a1d4b677ed1a767e7a5
-
SHA512
987405a19d60418d9edc6905fb6ad561eb6b2d7da42fd3eea71aa0aa383cb66efaae69ab3724f79b400241cbcbd46624037888a92bf160d3faae75c95f6173bf
-
SSDEEP
98304:HDDSjvCqedA9zyULG+abhmTjrQYaeA9zyULG+oYg3vdcA9zyULG+abhmTjrQYaeQ:HnSjKqRzLqJbIn2vzLq5Ygfd5zLqJbI3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2344 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2344-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x000a00000001650c-11.dat upx behavioral1/memory/2344-15-0x0000000023590000-0x00000000237EC000-memory.dmp upx behavioral1/memory/3052-18-0x0000000000400000-0x000000000065C000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2644 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2344 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2344 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3052 2344 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 29 PID 2344 wrote to memory of 3052 2344 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 29 PID 2344 wrote to memory of 3052 2344 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 29 PID 2344 wrote to memory of 3052 2344 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 29 PID 3052 wrote to memory of 2644 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2644 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2644 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2644 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2720 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 32 PID 3052 wrote to memory of 2720 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 32 PID 3052 wrote to memory of 2720 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 32 PID 3052 wrote to memory of 2720 3052 fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe 32 PID 2720 wrote to memory of 2572 2720 cmd.exe 34 PID 2720 wrote to memory of 2572 2720 cmd.exe 34 PID 2720 wrote to memory of 2572 2720 cmd.exe 34 PID 2720 wrote to memory of 2572 2720 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\fc4d7621230751a74cd05fe95545a88e_JaffaCakes118.exe" /TN 6ek6uOO9da42 /F3⤵
- Creates scheduled task(s)
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN 6ek6uOO9da42 > C:\Users\Admin\AppData\Local\Temp\N5aWsJ.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN 6ek6uOO9da424⤵PID:2572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fa44002ed22dbaa940a231f2d705c044
SHA1f12253fe3cf55ca4a59f493beb59cbbb6510bf00
SHA2568fe09d5d9c6781b53a73893695c8e2dee9581da087255e4355047addc5c7c519
SHA51292369a83d9d32b7f7a59bfd0f5c439a2567b8faaafe3b894dcbeff826cbe31c5c539a292f98c6ce733063153363b324f2e29bf282d4ccc24971f7175819a2638
-
Filesize
3.9MB
MD501e7ec600edd7bfbf02b3fbde4f5771c
SHA103da206811ed01c61d3ad0f520358374c6d2145f
SHA2562dd6eebd17de9211ca81a995f13dccc110fbc74ef71a98fb656e7e24b2aef350
SHA5124a6d34f5a2a4bd6a5268631d81087db268c9d5c39d94b28bc46b89e89b082c55385f6f5ef4352120cd4fcce5f52ce84dbb2343332719308cf432b3f016cc7dd3