Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe
-
Size
84KB
-
MD5
fdf9718bdb96b218beea1003afa0e98b
-
SHA1
607e91624ad3069d51ea70b81fbc78038c634770
-
SHA256
a200c07b77016522045b9f67709bf2057a8c2db185d3fa3e2a7adf20cf62d4a0
-
SHA512
0eb1cffa985933fb4c8a7ea430df8d5fa39074a551834af99f8630b99412e3beef803549d4ac0dcc7df5cca0ee59a2a94db922c9856df955e22e71b762775fd7
-
SSDEEP
1536:zgBLRZST7DxVG7tk5YVlJ9suPGnq/qmFa0hsuA8uPV5lVpFJsYla2JHh:zghRZST7DxvKJfx/5suAjVFp8mh
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Evilotus\Parameters\ServiceDll = "C:\\Windows\\system32\\Evilotus.dll" fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe -
Processes:
resource yara_rule \??\c:\windows\SysWOW64\evilotus.dll aspack_v212_v242 -
Loads dropped DLL 3 IoCs
Processes:
svchost.exepid process 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\Evilotus.dll fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Evilotus.dll fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription pid process target process PID 8 set thread context of 2972 8 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4516 2148 WerFault.exe svchost.exe 2352 2148 WerFault.exe svchost.exe 1816 2148 WerFault.exe svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exefdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exedescription pid process target process PID 8 wrote to memory of 2972 8 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 8 wrote to memory of 2972 8 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 8 wrote to memory of 2972 8 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 8 wrote to memory of 2972 8 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 8 wrote to memory of 2972 8 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe PID 2972 wrote to memory of 2904 2972 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe cmd.exe PID 2972 wrote to memory of 2904 2972 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe cmd.exe PID 2972 wrote to memory of 2904 2972 fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe2⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\fdf9718bdb96b218beea1003afa0e98b_JaffaCakes118.exe"3⤵PID:2904
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 4362⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 4442⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 4522⤵
- Program crash
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2148 -ip 21481⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2148 -ip 21481⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2148 -ip 21481⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD54963f73a6a1fb8a40b6439e7db2bf2e1
SHA1a791751b79396e905abe79d05191a35f311ce9c0
SHA256f92357aaf5234f05e7ff91ab05083e32d51c8163593d62c970ea7e2fe76d035e
SHA5123e952228cffbf56eb7b9b1a330804d750ee5973ec958558686c7622e3e0938878b83f355a80da87546d27508d6b07b110b05b3a0c0020e76be24308a5436c68e