Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe
-
Size
222KB
-
MD5
ff580b1bcf7e5d17584c9b6422794cc4
-
SHA1
70edae37241533d16031b272ffc2e50773dc2833
-
SHA256
902f92bdbd5dbdd9534149faa18b00d8b983665820427480c93bead483f32c92
-
SHA512
92bf1bb51cd0b833e31ae2ead4012a1959060d52ddc05ab51fd5e2a8f3c051be6013ddb984af3dbbf59672556d8896fa46d8b6e06f120032f123a9134bad85cf
-
SSDEEP
3072:QziG1vkCO48iilEvyj6uejpXI/52Q7YWnWnCNeoBbqQsZWYTb:CzA48i8EvyjPsl7WWCIwbqdc
Malware Config
Extracted
smokeloader
pub1
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2928 1020 WerFault.exe ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff580b1bcf7e5d17584c9b6422794cc4_JaffaCakes118.exe"1⤵
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 3522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1020 -ip 10201⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1020-1-0x0000000002C70000-0x0000000002D70000-memory.dmpFilesize
1024KB
-
memory/1020-2-0x00000000049B0000-0x00000000049B9000-memory.dmpFilesize
36KB
-
memory/1020-3-0x0000000000400000-0x0000000002C6D000-memory.dmpFilesize
40.4MB
-
memory/1020-4-0x0000000000400000-0x0000000002C6D000-memory.dmpFilesize
40.4MB