Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe
-
Size
261KB
-
MD5
ffc0887f3589b4d2af512bad4afc7349
-
SHA1
6f06af4e3cb6afb772179f16657b770ee9ef4a3b
-
SHA256
eb06b06e8ca98136027ad3aa5f873f9a4af34141f7f6c9071e14d41df6fe2afd
-
SHA512
ae9009ba1626a2e100a865f675b181e9420fd1727486887a675253aa7688c1918081d508f54ecdb84eb49033ee76fff2353a318bc3ee63674f07c03103577986
-
SSDEEP
6144:96aGmgBm3w8gzPjD44e3RJQ8U7OF1sW8dWvYkWGKsHz4wnh:9lP3AzPj84MrQbsfvYov4w
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 Wvotoa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\3ETECE6I8G = "C:\\Windows\\Wvotoa.exe" Wvotoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe File created C:\Windows\Wvotoa.exe ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe File opened for modification C:\Windows\Wvotoa.exe ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main Wvotoa.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International Wvotoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe 2744 Wvotoa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 2744 Wvotoa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2744 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 28 PID 2060 wrote to memory of 2744 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 28 PID 2060 wrote to memory of 2744 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 28 PID 2060 wrote to memory of 2744 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 28 PID 2060 wrote to memory of 2744 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 28 PID 2060 wrote to memory of 2744 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 28 PID 2060 wrote to memory of 2744 2060 ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffc0887f3589b4d2af512bad4afc7349_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Wvotoa.exeC:\Windows\Wvotoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD53f2b5441067bd330383033d5cc671fff
SHA1efe6c33c28fdeab5a722f94fa38b2f2beab663e3
SHA256d3f89dd78679212ff6739158b7c22956dee046d6bfeb9702565a4db00f9e053b
SHA51217b1e20c65a5327eab9fdc5ceb196e20b0dde93c69b50e30dcc38e45e68e831e8fb5d5408b85c409ae24d468639890732e6a698a08d7714b01846afa3255f7a3
-
Filesize
261KB
MD5ffc0887f3589b4d2af512bad4afc7349
SHA16f06af4e3cb6afb772179f16657b770ee9ef4a3b
SHA256eb06b06e8ca98136027ad3aa5f873f9a4af34141f7f6c9071e14d41df6fe2afd
SHA512ae9009ba1626a2e100a865f675b181e9420fd1727486887a675253aa7688c1918081d508f54ecdb84eb49033ee76fff2353a318bc3ee63674f07c03103577986