Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe
-
Size
40KB
-
MD5
0e9a8e8bfb73406e5cbc3e18520bd6af
-
SHA1
f6888782e9ef509563e54292b9b50c46c934b263
-
SHA256
b81326b4036b634fc4fa871d25cfb11ac9c80b010d521c6bf4e1c0cff0468fe2
-
SHA512
359898dbd4acfe91a81019f264d5b8f33a14aabaf4ee67fda1fb14580e618eb332fe97d9e426bca933beb4028a3f1abe1af36e5615df55cc0755fbb1beea4ed8
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHpqpu:aqk/Zdic/qjh8w19JDH9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1552 services.exe -
resource yara_rule behavioral2/files/0x000d000000023b90-4.dat upx behavioral2/memory/1552-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-169-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-170-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-174-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-178-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-204-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-207-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-303-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-403-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1552-485-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe File created C:\Windows\services.exe 0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe File opened for modification C:\Windows\java.exe 0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1552 1608 0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe 84 PID 1608 wrote to memory of 1552 1608 0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe 84 PID 1608 wrote to memory of 1552 1608 0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e9a8e8bfb73406e5cbc3e18520bd6af_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ae5a019cde88822d3f33d34b01739a7e
SHA1b9e44f2444b316db85d378c51d0e735e8df2f8c7
SHA2562118e993a3afa4f94183eec7bb99ff7815cac71bb51105854b929121ea8f03a1
SHA5121dd0c5fca184b915b8a1567e30cfd8159184d49b4e5cbf4317a5df46e29a708d1596779cacfd8e907b2ca82156f0528799ebc901a0b7282e342d88a19f6693bf
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
126KB
MD5cb065172cc8e05c8fe9d0a48781fcef5
SHA150699a6524299f722349845fb93e3e101c5d7c32
SHA25656163fe0e3557c5767aad82c46e395334816e823cb8955741aa138ff4a242b5c
SHA5127cf7d8cef5d526ebca04414b0fcee4609474e386dd53527e977ab4c87e091d1386434d0bcd1ad902e2f0848ed8f0fe5a118bd3c7261bef92bdfacdfab57d18b1
-
Filesize
163KB
MD5f1ec3e77c685d29e4551893d4a1e6027
SHA1d85a35e7e0d1ece9c22efd551981ad2a4bc5138e
SHA256988b46f713ce694f0f4b346d78ee1c420685aab89bd74669e8bcbd2fd5ac2e03
SHA512ae1e6c3f94aee037d3b822314adf86fd15f6903372961cea71cf1481354687140f0f61b19bde0ff883dbba87942c22bbd76e13cb0adbd333816ac99653f5d120
-
Filesize
133KB
MD52a5cb579190217bb5a37743f8e836820
SHA1d39617627b5023ed6397d6eeb1a4e64591a88ec7
SHA25660a53a54fcbce898787c97847bfee4f61502ebbc83c063e30f719a4df2d4de52
SHA512fcb47ee111194f024185655a79d7e9638a86270894325d3adac3005e1cd4eb17b5ae4b1b5de52cc3fc737e6d153d10599986977abc6e3b27662d69bd5b20ccf3
-
Filesize
110KB
MD517e24935a9460cec70a82d8dc0335e0e
SHA148b70d981c081539f7b5720f5ba035cd3c07463a
SHA2560888b16ce4228276636a0da9f51ada413697d9acc6bc4ce287f9d2ef1b0eb1b5
SHA512f293109a8bd9e39e260615a7aea45d1e42cb02c571fd371a6d683dc34d5d37afbe342716c8a684f72ba516e6252d99a839a6b371a1e2f99eefb56364147dba42
-
Filesize
114KB
MD552e61ca28506f212452ad1188165463c
SHA1d793a3289f82e0eb331194ca72982807a3c361d2
SHA25694f7ae2edb26181d3c07d1388891dd1f74d62d1a85092d623579bca253c6b3b8
SHA512930d281765e07916cb188ef61426bf3a264e93bfac06ef1a3b25f12916ecd5a600528475f9387e257b4515483c7e2e35dae551ba16d302a826f95e10ab876bf8
-
Filesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
Filesize
102KB
MD544d400187773a6708cd7e40e43bb23b4
SHA1c0977164f83ced7d15195b0393ad6d0059225154
SHA2561799c7637bc8c77cb2c7851534b26688b6a1856d18ba12a4fb5d94ce969ed912
SHA5121f2e23945b98f9b88ef760da9a8451f8438cd12c43873924076ed0269019e66dc05a3c0aa886fc817c8a2e0b11827866a7e5e546d64595c3211b27fa4013472d
-
Filesize
121KB
MD5ecee9c327fb0d4920bfadae9eb9d2dc8
SHA172510cecf9e2d321979817fa6aee209a76aadc26
SHA256559233c104b099fe8e36971e3a5ed8eba07cfea10de77656db74ca37280399de
SHA512ae02635e02a953919d845572c4973f7016c9c0fa1e3285c4e99a5fe3fc3c2b28fb5709ffde7f353aca342cf32b2a8eeca6fe29693285db84595ec1a32ce85f7b
-
Filesize
40KB
MD53dbeadc2b91b3b15f805df597c836d30
SHA19a9976bfd117dfa648310a50388f38973b78d93b
SHA256ae187b3b9ff50703d2f0664196481643490767d4a888f379515186af06856d29
SHA51260744a79320e7433ab77cfad855b4e778d85c15d4bbea64511639156a2edb3787707fdd9da39ca914afe6d6865e7d0d33731b1c5b2135e97654a9fe76a77266c
-
Filesize
1KB
MD54a6b04aca60181ad2816d7554a4e9b93
SHA1f400cad6b096c018ed73fa75fec4476374cb1d38
SHA2563218ef285dfb5c892896f34df2113046ef93184631a3e174f35028c8e9f4cf6c
SHA5122750c929fc4c9bb08c67bf2fe20e9d46acdc691351353c2705a79ff2a8698e128ded74c0c0974a508cb396e28fff418bb91656278a45498b1dd251d0e16f29fc
-
Filesize
1KB
MD50b526dc1ee24feb48e2ef6718debef29
SHA1ba6b964ddc53b0af6653af5ef216c38b0747f5f5
SHA256b92090a74dc00203fc9dbafac3b0feaa317ec1960ce88b4a08711a8a31bc5fa0
SHA51254f18801562d65982ec65fb219b5ab89507a321f4b1b90f062d34a4c2bbf639b1d300636797f209838741d6f1179ba6b41d5e429f340f715e270bd34a5b76cd9
-
Filesize
1KB
MD529ed50e9b6d2e05863be3329954a6829
SHA14979b4892bceadb6e81dd2dc15d31fc36f3704a3
SHA2566272c251a9eceba8db031a68591f9f7cc5c8b1e849c99b6e4bf63ad24d3d0ea9
SHA512220a28e1d213cffa9d0e7c2eb4c81d2cdd49b1765ed18bdb3f211e42954b8565d1d01d242aec399fec1dfe88102f397ae0c719acd5932cd11808d2d11df88d62
-
Filesize
1KB
MD52f9e947a6eee8a7221bc14b640038865
SHA1c2bc61245f77f3ac66fd7b73b5e418d383a3f7fa
SHA256154deae6c719623b656fbe7b201a6755357383858b5eb6ad03c549409a572e59
SHA5128c412c4e825ba4ecb497fd35093e8bf9695385cc5ef5255e4cc6a7e61289b72bb09c0570caca65fb65376e9836b8e9fe710e08df8ec278aa6d12a13fb3e3d3cd
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2