Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe
-
Size
24KB
-
MD5
ff69d546140e95132c240ab2e8156239
-
SHA1
4d2276b31121e73eacd67ae44004b442b39c5e64
-
SHA256
6dc1c5a3d619fc835450e1f3abf70f06fdd1b9d163e26b8f76620905ce942ec4
-
SHA512
7dc0dc3687eae427b89371cb1bb01953cf67901bea8aae551c58d1561ed9af9bfbe0ba8db0e4f2dd162faf9c2da71ed39875f566bb4b0e95b9d52b54e91d9b1b
-
SSDEEP
384:E3eVES+/xwGkRKJ5nhlM61qmTTMVF9/q5N0:bGS+ZfbJ5hO8qYoAi
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4704 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4784 ipconfig.exe 4968 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4704 tasklist.exe Token: SeDebugPrivilege 4968 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4984 ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe 4984 ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1068 4984 ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe 87 PID 4984 wrote to memory of 1068 4984 ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe 87 PID 4984 wrote to memory of 1068 4984 ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe 87 PID 1068 wrote to memory of 548 1068 cmd.exe 89 PID 1068 wrote to memory of 548 1068 cmd.exe 89 PID 1068 wrote to memory of 548 1068 cmd.exe 89 PID 1068 wrote to memory of 4784 1068 cmd.exe 90 PID 1068 wrote to memory of 4784 1068 cmd.exe 90 PID 1068 wrote to memory of 4784 1068 cmd.exe 90 PID 1068 wrote to memory of 4704 1068 cmd.exe 91 PID 1068 wrote to memory of 4704 1068 cmd.exe 91 PID 1068 wrote to memory of 4704 1068 cmd.exe 91 PID 1068 wrote to memory of 2112 1068 cmd.exe 94 PID 1068 wrote to memory of 2112 1068 cmd.exe 94 PID 1068 wrote to memory of 2112 1068 cmd.exe 94 PID 2112 wrote to memory of 1916 2112 net.exe 95 PID 2112 wrote to memory of 1916 2112 net.exe 95 PID 2112 wrote to memory of 1916 2112 net.exe 95 PID 1068 wrote to memory of 4968 1068 cmd.exe 96 PID 1068 wrote to memory of 4968 1068 cmd.exe 96 PID 1068 wrote to memory of 4968 1068 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff69d546140e95132c240ab2e8156239_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:548
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4784
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:1916
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD53c2b9b0cad0179f39a64142002606624
SHA110cc34de0e088cb0b58fbc01be4f561f81193530
SHA25616ccec7c86664505b82d4d4534877b82d90f8a0b04466c405c334660e20cf5bb
SHA51248a40b208ffca0b4e1df792bc0b5cf9b76c020fa4a7bd8ae16b9008b6701db6695e6b3cb647a1b5b5cfd4de80c3b3996e2b9176167d9e96327b7b94e213d4114