Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe
-
Size
96KB
-
MD5
03f891aeb8fd33cd03997d9bcc61d226
-
SHA1
bb12d2d8bc7d3e049cdcda106a14090ee040402f
-
SHA256
04fd4bdd959ef2dbc5b2cfa6bbd3c43ab6efe17f8b7b207674609632366ecaa3
-
SHA512
86a7d98adc152b936dde1ccf424b006037761a9759d37156bdf9f2e84c8187f8ea06696b2863f812b2c08b4ca9c16af05a3eecf1b23a336056c25d8a23e55cbb
-
SSDEEP
768:6QRDFK7Eii2bH6euqSQ77Vh1P1BL6C26Ks1QWDC19Q26nfaslZTb:6QRQw72baejLZ31Qd165fXF
Malware Config
Extracted
guloader
https://bngsmartshop.com/frank.bin
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 1 IoCs
pid Process 2796 filename1.exe -
Loads dropped DLL 3 IoCs
pid Process 2608 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2608 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2772 filename1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\subfolder1\\filename1.vbs" 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\subfolder1\\filename1.vbs" filename1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2608 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2796 filename1.exe 2772 filename1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2452 set thread context of 2608 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 28 PID 2796 set thread context of 2772 2796 filename1.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2796 filename1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 2796 filename1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2608 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2608 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2608 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2608 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 28 PID 2452 wrote to memory of 2608 2452 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 28 PID 2608 wrote to memory of 2796 2608 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 29 PID 2608 wrote to memory of 2796 2608 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 29 PID 2608 wrote to memory of 2796 2608 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 29 PID 2608 wrote to memory of 2796 2608 03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe 29 PID 2796 wrote to memory of 2772 2796 filename1.exe 30 PID 2796 wrote to memory of 2772 2796 filename1.exe 30 PID 2796 wrote to memory of 2772 2796 filename1.exe 30 PID 2796 wrote to memory of 2772 2796 filename1.exe 30 PID 2796 wrote to memory of 2772 2796 filename1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03f891aeb8fd33cd03997d9bcc61d226_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\subfolder1\filename1.exe"C:\Users\Admin\subfolder1\filename1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\subfolder1\filename1.exe"C:\Users\Admin\subfolder1\filename1.exe"4⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD503f891aeb8fd33cd03997d9bcc61d226
SHA1bb12d2d8bc7d3e049cdcda106a14090ee040402f
SHA25604fd4bdd959ef2dbc5b2cfa6bbd3c43ab6efe17f8b7b207674609632366ecaa3
SHA51286a7d98adc152b936dde1ccf424b006037761a9759d37156bdf9f2e84c8187f8ea06696b2863f812b2c08b4ca9c16af05a3eecf1b23a336056c25d8a23e55cbb