Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe
-
Size
14.6MB
-
MD5
fcaf02b6fabfd8432417befde16f26ac
-
SHA1
a48650e4c45e59be8f31d927aa22a52eb8d21eb1
-
SHA256
2f9c8d486b3bf2191829cef60339da2bec644fcd1b578cffde7a910b17ca8d0a
-
SHA512
aa15c4a715fbdf0e5d2aa95442d0e7476643034b12bc061d7a9dd1a2ed840bcf407210c69589c5b2c00c66475e2af1ca21e357c368207d5c94833e9834cb4da7
-
SSDEEP
98304:f19swT8KfHkpvVkBUp56DJ4hxmH1F32iZU8Usu4:f/7ZAv2kt3s3rT
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2660 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
RuntimeBroker.exepid process 2620 RuntimeBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1936 schtasks.exe 1684 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
Processes:
powershell.exepowershell.exepid process 1144 powershell.exe 2432 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 1144 powershell.exe 2432 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1144 powershell.exe Token: SeDebugPrivilege 2432 powershell.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.execmd.execmd.exedescription pid process target process PID 2184 wrote to memory of 2364 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2364 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2364 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe cmd.exe PID 2364 wrote to memory of 1144 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 1144 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 1144 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 1144 2364 cmd.exe powershell.exe PID 2184 wrote to memory of 2620 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe RuntimeBroker.exe PID 2184 wrote to memory of 2620 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe RuntimeBroker.exe PID 2184 wrote to memory of 2620 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe RuntimeBroker.exe PID 2184 wrote to memory of 2620 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe RuntimeBroker.exe PID 2184 wrote to memory of 2660 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2660 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe cmd.exe PID 2184 wrote to memory of 2660 2184 fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe cmd.exe PID 2660 wrote to memory of 2548 2660 cmd.exe PING.EXE PID 2660 wrote to memory of 2548 2660 cmd.exe PING.EXE PID 2660 wrote to memory of 2548 2660 cmd.exe PING.EXE PID 2660 wrote to memory of 2692 2660 cmd.exe PING.EXE PID 2660 wrote to memory of 2692 2660 cmd.exe PING.EXE PID 2660 wrote to memory of 2692 2660 cmd.exe PING.EXE PID 2364 wrote to memory of 2432 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 2432 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 2432 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 2432 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 1936 2364 cmd.exe schtasks.exe PID 2364 wrote to memory of 1936 2364 cmd.exe schtasks.exe PID 2364 wrote to memory of 1936 2364 cmd.exe schtasks.exe PID 2364 wrote to memory of 1684 2364 cmd.exe schtasks.exe PID 2364 wrote to memory of 1684 2364 cmd.exe schtasks.exe PID 2364 wrote to memory of 1684 2364 cmd.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dhksajhdjkhsahdjksa.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\syswow64\windowspowershell\v1.0\powershell.exeC:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoProfile -NoLogo -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath "C:\Users\Admin "3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\syswow64\windowspowershell\v1.0\powershell.exeC:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoProfile -NoLogo -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp "3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /CREATE /SC ONLOGON /TN "MyTasks\Runtime" /TR "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"3⤵
- Creates scheduled task(s)
PID:1936
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /CREATE /SC ONLOGON /TN "MyTasks\Services" /TR "C:\Users\Admin\AppData\Local\Temp\ServiceHost.exe"3⤵
- Creates scheduled task(s)
PID:1684
-
-
-
C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fcaf02b6fabfd8432417befde16f26ac_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 1003⤵
- Runs ping.exe
PID:2548
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 9003⤵
- Runs ping.exe
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD53430006c9a92ea11eea57db885d56450
SHA1780e33b4ed0595ab1bdfcd7b4ad2f0cc00e15bb2
SHA2566350b26074db9c4e800054bee09edc2373bb939c34a35208dbac805e15b50482
SHA5125633dc3f3524558bc9e6f0a00f4784aaa77f507f7b4f2edfb2261df4f03f53c7b7c9115758ef1aae54952ca5e612f28b2be5f52132fa2f3546fb2f4293554757
-
Filesize
589B
MD5b0d33def080a4731cff31d5d22e5e59b
SHA12cf25d141f4250ef03979abefff3f06e65667699
SHA256fd78b3f2e278d102d0f66a9f00125067c2e5e3d33eadeee796d9146267060d04
SHA512b4cca9cb617b92c283c19f3067edb09d4907a2c93ae34ca87c6e606464ba5ba8d42099c7a959066ee56043f3a71d726f3b41b4a36268c10b24a879268d988198
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58005a8c232966649f08803d198d7b9a3
SHA1764d2e05b7bc5a421713924bfbdae9c4f8e62911
SHA25634a766fd5358b1e9be903373fd45141bccf38f2d107a7a8678df08d5f7a5e0c1
SHA512b0cec3b62408f4f39b871702e884364d7a15af58d9007586caa82270f1a3913d66f085ecd165d4351a6b4559495e75164270edaeca7c16b21dc665916809eaf0