Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 15:48
Behavioral task
behavioral1
Sample
0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
0eec641ad196440c6b96d26eb1e2df71
-
SHA1
57390f67569275821600629d4af0b866d8d767b4
-
SHA256
0e4632b9d987a4aa439602b85e250fd4452e0a7275d20c71a61cf94f163a5e64
-
SHA512
811a1a0ec66186fbdcc3c4ea6db5bd56b13255f0e8468db9c19baa5393366c23e44edc8e43ffc7332b70b5b09d7468fcbcc1fe4fc3570dcecb40100bcea2290e
-
SSDEEP
49152:oj94sjTFctV5ymxJk7uIMppc6V4e17qbUnQEFPFNrK2vS2Yr9R+FOBvLHqnDsYo4:4jpg/ymxJkQpc6V3lHQEFPFNrK24X+Fr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2516 whtlvyqjoo.exe 2612 whtlvyqjoo.tmp -
Loads dropped DLL 6 IoCs
pid Process 1648 cmd.exe 2516 whtlvyqjoo.exe 2612 whtlvyqjoo.tmp 2612 whtlvyqjoo.tmp 2612 whtlvyqjoo.tmp 2612 whtlvyqjoo.tmp -
resource yara_rule behavioral1/memory/2476-0-0x00000000010B0000-0x00000000013B4000-memory.dmp upx behavioral1/memory/2476-7-0x00000000010B0000-0x00000000013B4000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xunjie\msvidc32.dll whtlvyqjoo.tmp File opened for modification C:\Program Files (x86)\Xunjie\xjhelper.exe whtlvyqjoo.tmp File created C:\Program Files (x86)\Xunjie\is-Q50CQ.tmp whtlvyqjoo.tmp File created C:\Program Files (x86)\Xunjie\is-VJG0N.tmp whtlvyqjoo.tmp File opened for modification C:\Program Files (x86)\Xunjie\msvcrt40.dll whtlvyqjoo.tmp File created C:\Program Files (x86)\Xunjie\is-HSM2S.tmp whtlvyqjoo.tmp File created C:\Program Files (x86)\Xunjie\is-9UIFG.tmp whtlvyqjoo.tmp File created C:\Program Files (x86)\Xunjie\is-SMCHO.tmp whtlvyqjoo.tmp File created C:\Program Files (x86)\Xunjie\is-VFRM6.tmp whtlvyqjoo.tmp File opened for modification C:\Program Files (x86)\Xunjie\unins000.dat whtlvyqjoo.tmp File created C:\Program Files (x86)\Xunjie\unins000.dat whtlvyqjoo.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2476 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 2476 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 2612 whtlvyqjoo.tmp 2612 whtlvyqjoo.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 whtlvyqjoo.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1648 2476 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 28 PID 2476 wrote to memory of 1648 2476 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 28 PID 2476 wrote to memory of 1648 2476 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 28 PID 2476 wrote to memory of 1648 2476 0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe 28 PID 1648 wrote to memory of 2516 1648 cmd.exe 30 PID 1648 wrote to memory of 2516 1648 cmd.exe 30 PID 1648 wrote to memory of 2516 1648 cmd.exe 30 PID 1648 wrote to memory of 2516 1648 cmd.exe 30 PID 1648 wrote to memory of 2516 1648 cmd.exe 30 PID 1648 wrote to memory of 2516 1648 cmd.exe 30 PID 1648 wrote to memory of 2516 1648 cmd.exe 30 PID 2516 wrote to memory of 2612 2516 whtlvyqjoo.exe 31 PID 2516 wrote to memory of 2612 2516 whtlvyqjoo.exe 31 PID 2516 wrote to memory of 2612 2516 whtlvyqjoo.exe 31 PID 2516 wrote to memory of 2612 2516 whtlvyqjoo.exe 31 PID 2516 wrote to memory of 2612 2516 whtlvyqjoo.exe 31 PID 2516 wrote to memory of 2612 2516 whtlvyqjoo.exe 31 PID 2516 wrote to memory of 2612 2516 whtlvyqjoo.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0eec641ad196440c6b96d26eb1e2df71_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\whtlvyqjoo.exe" /VERYSILENT2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\whtlvyqjoo.exe"C:\Users\Admin\AppData\Local\Temp\whtlvyqjoo.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\is-6AS5B.tmp\whtlvyqjoo.tmp"C:\Users\Admin\AppData\Local\Temp\is-6AS5B.tmp\whtlvyqjoo.tmp" /SL5="$90122,799475,54272,C:\Users\Admin\AppData\Local\Temp\whtlvyqjoo.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5f8b110dc2063d3b29502aa7042d26122
SHA11a0fd3db79eadc1ce714f6267d476ddbec0f5e79
SHA256e8730b0bf8f94cbb8babbfefb32cef8e8d19ec823f28c33a7d48c78589710762
SHA512f3125d3f575aff68105ebb3eadbce30547d34e12237d8ebbc555c6fe12bcc0a5ea85a38e26f2900d70af70ec07efde3b8cd65dc0fdada637496531245ea5052f
-
Filesize
1.1MB
MD5a1efbe65547fd9a8a533eb788eadf155
SHA18aa18ff2560f212e2e1f776673aa1c1c86a75bae
SHA2567b9747384f7f5732e6fb3bc12c3f96bcab53ed8d066d064e465bf9f51bb88618
SHA5125292b87e3f239a96499e74bfb301e6446773ea0390c9564e9781fd1afcd78a1c993f951e58908668fef1505749d2dd7ae3e695d003e7e3b10557e294a17433b7
-
Filesize
907KB
MD58f7c7ec68a60ee2fcabed9a254810940
SHA17315a1e8c14c378556df955f7af0a8e3c54e7122
SHA256b09787ae6f160882f286f9f4db00356f0e7a540f6ac436dfff9c0ab66b3a937d
SHA51224040b3307b40a3a28c09938e2bf37dc9a8aca3a41aa9fbf2d9302444dd6a8d7615870ce9796d4104e891d0eb9ebb82e13152e522eb731d53cdb8cb04eb18b4d
-
Filesize
2.0MB
MD57aac487695b38b88c9a4524e1bc46cd5
SHA11955dc3ae9e7c0c90d715da17c3eb1f10f6d1781
SHA256fc925e1888a24e9be4c1c6bbce845be0d76a9746172b6b7024ed16061b8198ff
SHA5124cece3a5cf90cbc6e34a39ea29a42c328c23b02efb05906cc8b7a080ab820a237e8f841b5c3b0b7f90753091166e24bcb4501f2ccccc2cc8a86c47452eeac2ae
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3