Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
18314d37e862d5c24f7f7d0f04bb9a09
-
SHA1
0c7156e2c3e336d14f87c8815fd9516496e6e53e
-
SHA256
63b27757379ae97b85007c26ac18b83f69edfed179544359eb92ff1d23803492
-
SHA512
3358fbb2d3cc862cdd7e414d647fc243c6df260380610a004a9151cf02f3649c7c6a80da2a418e43b4b8a941da2ac10a6d292b533b32ae15bfe67ad20e384eaf
-
SSDEEP
24576:1TfEWQMHi9jzdDnA0Hse37/kf+lsEmYmHfAlOFpe8Qk+Th/De:JcW4fWiL8g7m5Al98uTBK
Malware Config
Extracted
socelars
http://www.zhxxjs.pw/Info/
http://www.allinfo.pw/
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmpDiskScan.exepid Process 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp 2512 DiskScan.exe -
Loads dropped DLL 6 IoCs
Processes:
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmpWerFault.exepid Process 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2576 2512 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmppid Process 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmppid Process 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmpDiskScan.exedescription pid Process procid_target PID 2224 wrote to memory of 2820 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 28 PID 2224 wrote to memory of 2820 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 28 PID 2224 wrote to memory of 2820 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 28 PID 2224 wrote to memory of 2820 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 28 PID 2224 wrote to memory of 2820 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 28 PID 2224 wrote to memory of 2820 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 28 PID 2224 wrote to memory of 2820 2224 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe 28 PID 2820 wrote to memory of 2512 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp 29 PID 2820 wrote to memory of 2512 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp 29 PID 2820 wrote to memory of 2512 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp 29 PID 2820 wrote to memory of 2512 2820 18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp 29 PID 2512 wrote to memory of 2576 2512 DiskScan.exe 30 PID 2512 wrote to memory of 2576 2512 DiskScan.exe 30 PID 2512 wrote to memory of 2576 2512 DiskScan.exe 30 PID 2512 wrote to memory of 2576 2512 DiskScan.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\is-QEC79.tmp\18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-QEC79.tmp\18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.tmp" /SL5="$400EE,1255067,809984,C:\Users\Admin\AppData\Local\Temp\18314d37e862d5c24f7f7d0f04bb9a09_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 6604⤵
- Loads dropped DLL
- Program crash
PID:2576
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD57c45d6bb1ad157b2a1bcf846a70cf28e
SHA13093930da264cd169880d92acfd739750adde40c
SHA2569de4dd12e31445a073c04c64731676ebde5850fb7ffee5463cf398142c824c71
SHA5125af94e470a8e713bba3e24a08f47ea2cc6935acaf95afabf90cea71bb26cd0c860ed4d81bd0168cf3533c9d248eb883fa1d6cb982f7fafc1db908116b7b96192
-
Filesize
2.5MB
MD5b791cce5df067cdb8b8a8eae20d3c8f4
SHA19558d6e5de346d2e444ac869e885d101dcf94b83
SHA256c4905f1105c0d90fa77d346c8b088ac6a1a18326c0d356f24fee45ef6484955e
SHA512fada58d582d51406728cf6018110e0f8acef09b9f55fcb22252660524b98f33b7695c4f0cd3e4bfa6b47c4e82d7a335665a3be86f6ea3218ea30ffa7c025444f