Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe
-
Size
227KB
-
MD5
fcc9d1a205db2f39d40c151e94f71b7c
-
SHA1
66caf452889e757ad0e7247d3ea9a7104e711cb7
-
SHA256
75e849cb154f1bb7cac1cd1f01092432dec5e483987e6c9f6030acd36a3bc924
-
SHA512
41a8d47d380721a7816db5b89a0d8f89e1240f4dc0886d039f4545be320b224ff366885e7d1d5c14aa49226db5687cfaab47192a4bc3bc1d6c011c397739518a
-
SSDEEP
6144:PjbeiSLx2U8797OXlfcnsJut0HaE3F/8U:PutMUIO1wYHaE3xZ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2216 is151287.exe 2476 NEROUE~1.EXE -
Loads dropped DLL 6 IoCs
pid Process 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 2216 is151287.exe 2216 is151287.exe 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 2476 NEROUE~1.EXE -
resource yara_rule behavioral1/files/0x002a000000015d4c-32.dat upx behavioral1/memory/2476-43-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2476-46-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mljhgef.dll is151287.exe File created C:\Windows\SysWOW64\mljhgef.dll is151287.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2216 is151287.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2216 is151287.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 is151287.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2216 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2216 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2216 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2216 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2216 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2216 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2216 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 28 PID 2216 wrote to memory of 436 2216 is151287.exe 5 PID 2216 wrote to memory of 2568 2216 is151287.exe 29 PID 2216 wrote to memory of 2568 2216 is151287.exe 29 PID 2216 wrote to memory of 2568 2216 is151287.exe 29 PID 2216 wrote to memory of 2568 2216 is151287.exe 29 PID 2216 wrote to memory of 2568 2216 is151287.exe 29 PID 2216 wrote to memory of 2568 2216 is151287.exe 29 PID 2216 wrote to memory of 2568 2216 is151287.exe 29 PID 2216 wrote to memory of 2644 2216 is151287.exe 30 PID 2216 wrote to memory of 2644 2216 is151287.exe 30 PID 2216 wrote to memory of 2644 2216 is151287.exe 30 PID 2216 wrote to memory of 2644 2216 is151287.exe 30 PID 2216 wrote to memory of 2644 2216 is151287.exe 30 PID 2216 wrote to memory of 2644 2216 is151287.exe 30 PID 2216 wrote to memory of 2644 2216 is151287.exe 30 PID 2416 wrote to memory of 2476 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2476 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2476 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2476 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2476 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2476 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2476 2416 fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcc9d1a205db2f39d40c151e94f71b7c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\is151287.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\is151287.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe ›¼w^Χx,a3⤵PID:2568
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\removalfile.bat "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\is151287.exe"3⤵PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NEROUE~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NEROUE~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD59a7ef09167a6f4433681b94351509043
SHA1259b1375ed8e84943ca1d42646bb416325c89e12
SHA256d5739a0510d89da572eb0b0d394d4fb4dd361cd9ee0144b9b31c590df93c3be7
SHA51296b84cd88a0e4b7c1122af3ed6ce5edf0a9a4e9bf79575eadfac16b2c46f1278d57755d29f21d7c6dcb4403be24b7ac7da4837c6cc9c602342a8f2b8e54883df
-
Filesize
123KB
MD5db457a863378b2fc8dbe1f99e97e7dbb
SHA1b1519970a4878fefdd338f4ae40bc2ebc4f174ae
SHA256c95035bdf86b3a0f9280e2d0e9648df870b7e8eed1a10f3a0d96a52163848e0b
SHA5128463e4795fe4ce24e8fa372ae8328bfee736e85fe003fef06934de7900f859fed7cb5d61c2271c25ead80cc4b23c79b4e5afeb0f6d7a374809defb805b807ef4
-
Filesize
63KB
MD5fb3994b7cb7d579a757e2de4ad23ca73
SHA1332616f3930b33892ad23859263e905281b80d10
SHA25673b6e2e6993560a93f96e1941d30012880558404e972782bbd658dca0497abeb
SHA512a14ad157472056de804a3b6cf887fcaccb3bdaabd0c5c7901def665276f189513e386ee6f76cb1d69f27a88b14bb396947924c28d08b76429c1e56d66cb86000
-
Filesize
37KB
MD5815e81bf1685a4b058f0ba76fadf4cd0
SHA1f0f75e0458946f634f2ae80e8b4bacb7cc73833e
SHA2565ef97b357669a64ae06a8d908f5f72cc575b42adca33ebd18a690167399d9d83
SHA51221a3ad2eb2906d741b96feb60139c57cb190cd58c228ef56a860bce27d59399d38d940af74621f1e46abfa53a6878843959e34802b7dbd7854c310bb09016b01