Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe
-
Size
3.8MB
-
MD5
fd89e94fe07afdab85c2c944a9171a4f
-
SHA1
ee69c94e9e8da31ea4e782f1287f1742430db3b4
-
SHA256
8d58498212958aead000c47859498f33c067edeb4122805e08ec59efac080534
-
SHA512
25dcc775246ed0d0d20ed27ff4ef4b13142dd84098538b5d43e0de9d5b4a1ff035e153df5cb2557cbbcc13dea2a513eea4f2ede58c6aaf9abf0073e207956593
-
SSDEEP
98304:epOBG6ITueKHmh6DKVI8Jpf1TkcyNAgWZRy6pC+YUsWDtbyTlfnC/GR:qOU/emEDgBdv+9WZRLR0WDt
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\Arquivos de programas\\Windows32.exe" fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\REL_AVG70.txt fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1096 sc.exe 1844 sc.exe -
Runs net.exe
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4164 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 89 PID 1188 wrote to memory of 4164 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 89 PID 1188 wrote to memory of 4164 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 89 PID 1188 wrote to memory of 4884 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 90 PID 1188 wrote to memory of 4884 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 90 PID 1188 wrote to memory of 4884 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 90 PID 1188 wrote to memory of 1096 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 93 PID 1188 wrote to memory of 1096 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 93 PID 1188 wrote to memory of 1096 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 93 PID 1188 wrote to memory of 1844 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 94 PID 1188 wrote to memory of 1844 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 94 PID 1188 wrote to memory of 1844 1188 fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe 94 PID 4884 wrote to memory of 2060 4884 net.exe 97 PID 4884 wrote to memory of 2060 4884 net.exe 97 PID 4884 wrote to memory of 2060 4884 net.exe 97 PID 4164 wrote to memory of 4120 4164 net.exe 98 PID 4164 wrote to memory of 4120 4164 net.exe 98 PID 4164 wrote to memory of 4120 4164 net.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd89e94fe07afdab85c2c944a9171a4f_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\net.exenet start GbpSv2⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start GbpSv3⤵PID:4120
-
-
-
C:\Windows\SysWOW64\net.exenet stop GbpSv2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop GbpSv3⤵PID:2060
-
-
-
C:\Windows\SysWOW64\sc.exesc stop GbpSv2⤵
- Launches sc.exe
PID:1096
-
-
C:\Windows\SysWOW64\sc.exesc config GbpSv start= disabled2⤵
- Launches sc.exe
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1