Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 10:04
Behavioral task
behavioral1
Sample
ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe
-
Size
15KB
-
MD5
ff088e0e7adf026b8b314b8b53521eb6
-
SHA1
a5523f35369403619a92c96cf49abca2ec69d72e
-
SHA256
bdb1061b005022b5cd8f6f4f7a7f014abc3cd36e9bfc7fa54a44b64e3a02b51d
-
SHA512
57a1878f4468a3a6c217a4dd6ea52544c049d034ed7fe1981b1eacdb566b2b0040e44f6ef224ea0edfbc05aab75dbe3af6d305bc38496bf9268417f490ab6ab0
-
SSDEEP
384:61emKqaN0LD2/E0rNx/UOUnMIyfXg5Krj4+y:VGLD105xkMIuXg5Oj4+
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run wcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\this = "C:\\Program Files (x86)\\Web Technologies\\wcs.exe" wcs.exe -
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 wcs.exe -
Loads dropped DLL 2 IoCs
pid Process 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2960-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/files/0x000a000000015cb6-2.dat upx behavioral1/memory/3044-19-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2960-21-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Web Technologies\wcs.exe ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe File created C:\Program Files (x86)\Web Technologies\wcu.exe ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2064 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2064 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2064 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2064 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 28 PID 2960 wrote to memory of 3044 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 29 PID 2960 wrote to memory of 3044 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 29 PID 2960 wrote to memory of 3044 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 29 PID 2960 wrote to memory of 3044 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 29 PID 2960 wrote to memory of 2564 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2564 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2564 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 30 PID 2960 wrote to memory of 2564 2960 ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff088e0e7adf026b8b314b8b53521eb6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:2064
-
-
C:\Program Files (x86)\Web Technologies\wcs.exe"C:\Program Files (x86)\Web Technologies\wcs.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:3044
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵
- Deletes itself
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD51022c431041eab4388a3731a53136377
SHA1f09529eb353f1294ed0b570d4cde341cee70590e
SHA2562bded950e108b3ec2e228928d49f64c37f3759a0823491d2d1668edc8e2e02b9
SHA512181cb638084fc5968a2123aca4d16435d22fb39db8aaa302345a1e494cdfd673ba4a1a30194564807374f239c0d6590d802918e351a25cd2f5cb728a76c54e67
-
Filesize
7KB
MD59fbec80843fc33d750d9dec08687f26a
SHA11ccd6f1f1949146a0f2099be1c21ebdb66739db3
SHA2568142acf11922e94e7812ace3955747b8bab14650dbc999ebf21cb69ac4bfdeca
SHA51294e10cad3dede8861a9588917faf286830d89cdeb5ee070f36ac89b155bdfaee9368e69a533341b34f74114c3be619659e562390920f7a35a2c0dbd155e041b3