Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe
-
Size
84KB
-
MD5
fdf9718bdb96b218beea1003afa0e98b
-
SHA1
607e91624ad3069d51ea70b81fbc78038c634770
-
SHA256
a200c07b77016522045b9f67709bf2057a8c2db185d3fa3e2a7adf20cf62d4a0
-
SHA512
0eb1cffa985933fb4c8a7ea430df8d5fa39074a551834af99f8630b99412e3beef803549d4ac0dcc7df5cca0ee59a2a94db922c9856df955e22e71b762775fd7
-
SSDEEP
1536:zgBLRZST7DxVG7tk5YVlJ9suPGnq/qmFa0hsuA8uPV5lVpFJsYla2JHh:zghRZST7DxvKJfx/5suAjVFp8mh
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Evilotus\Parameters\ServiceDll = "C:\\Windows\\system32\\Evilotus.dll" fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe -
Processes:
resource yara_rule \??\c:\windows\SysWOW64\evilotus.dll aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2564 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
svchost.exepid process 2632 svchost.exe 2632 svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\Evilotus.dll fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Evilotus.dll fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription pid process target process PID 1340 set thread context of 2668 1340 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exefdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription pid process target process PID 1340 wrote to memory of 2668 1340 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 1340 wrote to memory of 2668 1340 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 1340 wrote to memory of 2668 1340 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 1340 wrote to memory of 2668 1340 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 1340 wrote to memory of 2668 1340 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 1340 wrote to memory of 2668 1340 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 2668 wrote to memory of 2564 2668 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe cmd.exe PID 2668 wrote to memory of 2564 2668 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe cmd.exe PID 2668 wrote to memory of 2564 2668 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe cmd.exe PID 2668 wrote to memory of 2564 2668 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe2⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe"3⤵
- Deletes itself
PID:2564
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD54963f73a6a1fb8a40b6439e7db2bf2e1
SHA1a791751b79396e905abe79d05191a35f311ce9c0
SHA256f92357aaf5234f05e7ff91ab05083e32d51c8163593d62c970ea7e2fe76d035e
SHA5123e952228cffbf56eb7b9b1a330804d750ee5973ec958558686c7622e3e0938878b83f355a80da87546d27508d6b07b110b05b3a0c0020e76be24308a5436c68e