Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 14:50
Static task
static1
Behavioral task
behavioral1
Sample
3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
3aa9eaa066a025abe2ddd9fc87482187
-
SHA1
e3c42cab45a6e2c04cd98ee0a05aa7547f652d3e
-
SHA256
127063cf3ce461c1c6d82e548b36d3a6c00e0c231f25661f8adb417697e5e9ae
-
SHA512
c40ed916f26db9ca5bdc00d877b22216ec7ca934e24b67aac2fb69db4205d079b3c6eac7da0b37cc2593d4c46bf3ff75434f52d0774f1944f8fe85a5d8a612ed
-
SSDEEP
24576:PWvknOMEftxER6ieiWTt5rzPlEDJr2aqngPFuvJshQ+Y:PUeOMmZ7PDXt2JrPt2CS+Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 2712 Setup.exe 2712 Setup.exe 2712 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2712 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2712 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2712 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2712 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2712 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2712 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2712 3016 3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3aa9eaa066a025abe2ddd9fc87482187_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\a2Ugeu7UIG\FQYPn5I7\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2Ugeu7UIG\FQYPn5I7\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53aa9eaa066a025abe2ddd9fc87482187
SHA1e3c42cab45a6e2c04cd98ee0a05aa7547f652d3e
SHA256127063cf3ce461c1c6d82e548b36d3a6c00e0c231f25661f8adb417697e5e9ae
SHA512c40ed916f26db9ca5bdc00d877b22216ec7ca934e24b67aac2fb69db4205d079b3c6eac7da0b37cc2593d4c46bf3ff75434f52d0774f1944f8fe85a5d8a612ed