Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe
-
Size
476KB
-
MD5
ff8a950178dedea2cd5fac32eabe05a7
-
SHA1
5178cc759ddb8b8c454a8f127826280e8da85c6e
-
SHA256
a3ba1dab9f4cce4e32d55e53c188b1b88022fa1d8ded84313e3c469515fbefeb
-
SHA512
757bcddd2767bd3835a1c7a1919e1661c2fece4cf27b33db5ab3ce2f8e3b7869d982d89a3e3ffbb9f870d2f3bb3fd6aab8bb991c4364361a2dd050e07f311702
-
SSDEEP
12288:A29PHZyMqlqvkbXzz2jaSleSNevjm+lzHlXy3sxjGnhB:A29oZHbXejaGef79zHlC3wQ
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2340 XXiouIlxcI.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3048-1-0x0000000000600000-0x000000000067C000-memory.dmp upx behavioral1/memory/2340-14-0x0000000000600000-0x000000000067C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\XXiouIlxcI = "C:\\ProgramData\\XXiouIlxcI.exe" ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum XXiouIlxcI.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 XXiouIlxcI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Download ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe 2340 XXiouIlxcI.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2340 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe 28 PID 3048 wrote to memory of 2340 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe 28 PID 3048 wrote to memory of 2340 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe 28 PID 3048 wrote to memory of 2340 3048 ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff8a950178dedea2cd5fac32eabe05a7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3048 -
C:\ProgramData\XXiouIlxcI.exe"C:\ProgramData\XXiouIlxcI.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5ff8a950178dedea2cd5fac32eabe05a7
SHA15178cc759ddb8b8c454a8f127826280e8da85c6e
SHA256a3ba1dab9f4cce4e32d55e53c188b1b88022fa1d8ded84313e3c469515fbefeb
SHA512757bcddd2767bd3835a1c7a1919e1661c2fece4cf27b33db5ab3ce2f8e3b7869d982d89a3e3ffbb9f870d2f3bb3fd6aab8bb991c4364361a2dd050e07f311702