Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 12:05

General

  • Target

    179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe

  • Size

    220KB

  • MD5

    179680487558a29bcea4d8e8178a0ca7

  • SHA1

    99038ba9bcfcab13a686de8ab11ed0891c74c3d6

  • SHA256

    2b5c023c25af36dcfcf59a6b960065d709ee68e75419473681776561a037dbe7

  • SHA512

    4ac6fec73e3a540cd81e435111dacd688d40556a80f27989bf338c7935a985e0e28dd855aa4fc8a21ea27a6792e409e643bd3981990252c28fb4284810dad75e

  • SSDEEP

    6144:l1cLTFofH3UorgDHojaUX8j3G4fhMiJ8nnnng1wte39fDyelW0ixs0Jm651kgTOD:l1cLTsxywW3xfqiJ8nnnngaghDJ5ixJK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\system32\svchost.exe
      svchost.exe
      2⤵
        PID:1880
        • C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
          C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
          3⤵
          • Executes dropped EXE
          PID:2900
          • C:\Windows\system32\svchost.exe
            svchost.exe
            4⤵
              PID:2580
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {E0D5BDC5-0F68-4B9A-9B42-449662478CBD} S-1-5-18:NT AUTHORITY\System:Service:
        1⤵
          PID:1440
          • C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
            C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
            2⤵
            • Executes dropped EXE
            PID:1332
            • C:\Windows\system32\svchost.exe
              svchost.exe
              3⤵
              • Drops file in System32 directory
              PID:2596
              • C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
                C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
                4⤵
                • Executes dropped EXE
                PID:2712
                • C:\Windows\system32\svchost.exe
                  svchost.exe
                  5⤵
                  • Drops file in System32 directory
                  PID:1148
          • C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
            C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
            2⤵
            • Executes dropped EXE
            PID:2040
            • C:\Windows\system32\svchost.exe
              svchost.exe
              3⤵
                PID:2228

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe

            Filesize

            220KB

            MD5

            179680487558a29bcea4d8e8178a0ca7

            SHA1

            99038ba9bcfcab13a686de8ab11ed0891c74c3d6

            SHA256

            2b5c023c25af36dcfcf59a6b960065d709ee68e75419473681776561a037dbe7

            SHA512

            4ac6fec73e3a540cd81e435111dacd688d40556a80f27989bf338c7935a985e0e28dd855aa4fc8a21ea27a6792e409e643bd3981990252c28fb4284810dad75e

          • C:\Windows\System32\config\systemprofile\AppData\Roaming\client_id

            Filesize

            100B

            MD5

            44bf3c7d88145126a247ac3bed91a2b3

            SHA1

            b424c8799df54559ab1dd1b7ec4687dd80104ab7

            SHA256

            068118eee28f04f5f227412939db6d122acbb29cca233cef13e2d53e0af1c180

            SHA512

            2acff93cceafec9de4daa237009f37e7c8ed1347057ea418fe28865fe4167ad047ffbd9ab4c0a27fa10ffd3962b5882e00faaaf5fdf2f197832c5ac93cd98298

          • memory/1880-6-0x0000000140000000-0x0000000140020000-memory.dmp

            Filesize

            128KB

          • memory/1880-7-0x0000000000060000-0x0000000000061000-memory.dmp

            Filesize

            4KB

          • memory/1880-9-0x0000000140000000-0x0000000140020000-memory.dmp

            Filesize

            128KB

          • memory/2196-0-0x0000000010000000-0x0000000010007000-memory.dmp

            Filesize

            28KB

          • memory/2196-5-0x0000000000220000-0x0000000000221000-memory.dmp

            Filesize

            4KB

          • memory/2580-24-0x0000000140000000-0x0000000140020000-memory.dmp

            Filesize

            128KB

          • memory/2900-20-0x0000000010000000-0x0000000010007000-memory.dmp

            Filesize

            28KB