Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
48578ca46a647e621583b8b3da2bbbc4
-
SHA1
d18da5d905ddc8977a63019df1aa32032c94a946
-
SHA256
2261f624e99b92e00913fd0fc189ae96bb115b3ae5b393e0170066f032b12af1
-
SHA512
55da81e0b1002f6678d64989939836606c40da7b65c43be12de41e0b5a365ed73d9b97aa41f94f9deea5d813707353630b7c70740f523af5aa576dd80bdde0ec
-
SSDEEP
24576:X53uhF8ZcjXB476PaZMr5U3aDAWaPUPTRNTwX6KR8+:X5+hFxPaZSCOtNkq8
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
csrss.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aes.url csrss.com -
Executes dropped EXE 2 IoCs
Processes:
csrss.comcsrss.compid process 2784 csrss.com 2272 csrss.com -
Loads dropped DLL 3 IoCs
Processes:
cmd.execsrss.comcsrss.compid process 3040 cmd.exe 2784 csrss.com 2272 csrss.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
csrss.comcsrss.compid process 2784 csrss.com 2784 csrss.com 2784 csrss.com 2272 csrss.com 2272 csrss.com 2272 csrss.com -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
csrss.comcsrss.compid process 2784 csrss.com 2784 csrss.com 2784 csrss.com 2272 csrss.com 2272 csrss.com 2272 csrss.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.execmd.execmd.execsrss.comcsrss.comdescription pid process target process PID 2128 wrote to memory of 2268 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 2128 wrote to memory of 2268 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 2128 wrote to memory of 2268 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 2128 wrote to memory of 2268 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 2128 wrote to memory of 1600 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 2128 wrote to memory of 1600 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 2128 wrote to memory of 1600 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 2128 wrote to memory of 1600 2128 48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe cmd.exe PID 1600 wrote to memory of 3040 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 3040 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 3040 1600 cmd.exe cmd.exe PID 1600 wrote to memory of 3040 1600 cmd.exe cmd.exe PID 3040 wrote to memory of 2828 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 2828 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 2828 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 2828 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 2772 3040 cmd.exe certutil.exe PID 3040 wrote to memory of 2772 3040 cmd.exe certutil.exe PID 3040 wrote to memory of 2772 3040 cmd.exe certutil.exe PID 3040 wrote to memory of 2772 3040 cmd.exe certutil.exe PID 3040 wrote to memory of 2784 3040 cmd.exe csrss.com PID 3040 wrote to memory of 2784 3040 cmd.exe csrss.com PID 3040 wrote to memory of 2784 3040 cmd.exe csrss.com PID 3040 wrote to memory of 2784 3040 cmd.exe csrss.com PID 3040 wrote to memory of 2672 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 2672 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 2672 3040 cmd.exe PING.EXE PID 3040 wrote to memory of 2672 3040 cmd.exe PING.EXE PID 2784 wrote to memory of 2272 2784 csrss.com csrss.com PID 2784 wrote to memory of 2272 2784 csrss.com csrss.com PID 2784 wrote to memory of 2272 2784 csrss.com csrss.com PID 2784 wrote to memory of 2272 2784 csrss.com csrss.com PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe PID 2272 wrote to memory of 2652 2272 csrss.com RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48578ca46a647e621583b8b3da2bbbc4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo JzHWSBvTS2⤵PID:2268
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < oNuxTjCXjWnYpM.com2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\PING.EXEping -n 1 SrHBN.SqZJ4⤵
- Runs ping.exe
PID:2828 -
C:\Windows\SysWOW64\certutil.execertutil -decode Lhe.com y4⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comcsrss.com y4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com y5⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe6⤵PID:2652
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
921KB
MD5dab8f26db6e8d76655d96b463513ce6a
SHA1ea9c3631f94233c06750776cd9bd18e27fbd8677
SHA256549d70cf61a50e8970e274bf7e76f4c9fab1e185189a8ad074e2a5bdea39005b
SHA512e406093eb802a5edbdc0e5f0a849d7f58f10dded413db9b6e0a4788125ba73c5b90f5d42a5d98ac68ba2e1fc01879c1403f32cfb3d8e5c26231c58e9751c2093
-
Filesize
288KB
MD550e71d12a6308a43ecafdff7c0c288ed
SHA1ace1d17c0ffacfa236090c947dc641973edb52cf
SHA2568c518b693e8030f1889578ccf7eaf3387f00ab0d80f08dcd2ce4c7e709cd74a1
SHA512e9c3cb2cb331ee12baa8efeb80c9d7a24a1b2c350ef1160d5b09c6481a895850e0eb8802692f1ba4a59b3b192354267cd6f0205c7babaf5db089ca3f4408a542
-
Filesize
1.3MB
MD552eaf780e2565257d38cb1b928fc7bd7
SHA1d7f7b5180966241b1408d69cb75913b82f9975cc
SHA25641de5f343229c79727df473de3b8e2fd8cdfcf495df5dbf039930c789f4aa473
SHA51265a85f84ab0bc6cb5ad593aa7a84472b0f0bb717097daece9fb3845fc87f01f9c0eb9f03ee8f08477c5b2dbb35ce27a376fdc52e1c5f9d3f391bbf9116645459
-
Filesize
2KB
MD57e79b5745337937bd60e266c1f045229
SHA1f165e11b04bc713ee702c6052b430af2157d74ec
SHA256412bed46d2ea8b3aa867940e3feae8889ca0669cd03097f7f83a39823d9a9f3c
SHA51266aa34a36e6f370018ebf00e4bd948fa19cad1f2fef0a6af6984d8da0ed270cc09b8f1fe3fdb06a7caf6b0302855b508cf35b45c55141eb3c8a7f739b3bd1ab0
-
Filesize
934KB
MD56598c41a263fcf26913b8e26711c5bc0
SHA11505e9b28252c11b99016fb86ac89eb4bb99e382
SHA2562d4521be86113f3f235149feb339401106524c644a09faed37a1e7bc17cac9c1
SHA512289d6e7ccfacefdad592faa263980adad656e90368475392b1c9b529104a0d2f74ad875b4913210f000ac3edc77c9701f24b0f23bea9b80376645c8e4d272346
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317