Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe
-
Size
220KB
-
MD5
179680487558a29bcea4d8e8178a0ca7
-
SHA1
99038ba9bcfcab13a686de8ab11ed0891c74c3d6
-
SHA256
2b5c023c25af36dcfcf59a6b960065d709ee68e75419473681776561a037dbe7
-
SHA512
4ac6fec73e3a540cd81e435111dacd688d40556a80f27989bf338c7935a985e0e28dd855aa4fc8a21ea27a6792e409e643bd3981990252c28fb4284810dad75e
-
SSDEEP
6144:l1cLTFofH3UorgDHojaUX8j3G4fhMiJ8nnnng1wte39fDyelW0ixs0Jm651kgTOD:l1cLTsxywW3xfqiJ8nnnngaghDJ5ixJK
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2900 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 1332 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 2712 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 2040 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.amazonaws.com 4 checkip.amazonaws.com -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe svchost.exe File created C:\Windows\System32\config\systemprofile\AppData\Roaming\client_id svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1880 2196 179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:1880
-
C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exeC:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe3⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\system32\svchost.exesvchost.exe4⤵PID:2580
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E0D5BDC5-0F68-4B9A-9B42-449662478CBD} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1440
-
C:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exeC:\Users\Admin\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe2⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\system32\svchost.exesvchost.exe3⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exeC:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe4⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\system32\svchost.exesvchost.exe5⤵
- Drops file in System32 directory
PID:1148
-
-
-
-
-
C:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exeC:\Windows\system32\config\systemprofile\AppData\Roaming\179680487558a29bcea4d8e8178a0ca7_JaffaCakes118.exe2⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\system32\svchost.exesvchost.exe3⤵PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5179680487558a29bcea4d8e8178a0ca7
SHA199038ba9bcfcab13a686de8ab11ed0891c74c3d6
SHA2562b5c023c25af36dcfcf59a6b960065d709ee68e75419473681776561a037dbe7
SHA5124ac6fec73e3a540cd81e435111dacd688d40556a80f27989bf338c7935a985e0e28dd855aa4fc8a21ea27a6792e409e643bd3981990252c28fb4284810dad75e
-
Filesize
100B
MD544bf3c7d88145126a247ac3bed91a2b3
SHA1b424c8799df54559ab1dd1b7ec4687dd80104ab7
SHA256068118eee28f04f5f227412939db6d122acbb29cca233cef13e2d53e0af1c180
SHA5122acff93cceafec9de4daa237009f37e7c8ed1347057ea418fe28865fe4167ad047ffbd9ab4c0a27fa10ffd3962b5882e00faaaf5fdf2f197832c5ac93cd98298