Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
459707024783aa1babe7470fb05b5999_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
459707024783aa1babe7470fb05b5999_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
459707024783aa1babe7470fb05b5999_JaffaCakes118.exe
-
Size
66KB
-
MD5
459707024783aa1babe7470fb05b5999
-
SHA1
0769bab8fa5b6d1017e5e6f527580dde18f161a0
-
SHA256
161dc14ab6022dbb142adeba822af647463c61b56c363c327cff76dd7ea651e3
-
SHA512
87407059b09a42e1e50c4a202c999ccfe6f195acce39ca41c32db5278574e33f436a30041b9c0b3f43819c281068daa549cea6cf708cd8e77561ff84c0c1771a
-
SSDEEP
768:N88LGKvH2IsJMrsqxuO5MCoMRGGIxDphmmEmkoNM6ibn2FQix5E+ieZ0QiSAmX:N88zH2IcMQu+CoM88mEmkoNM52FEnta
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Diskrun.exe\"" 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Diskrun.exe\"" 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2892 ded.exe 2588 ded.exe -
Loads dropped DLL 3 IoCs
pid Process 1968 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe 1968 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe 2892 ded.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Diskrun = "\"C:\\Users\\Admin\\AppData\\Roaming\\Diskrun.exe\"" 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 6 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\Autorun.inf 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe File opened for modification F:\Autorun.inf 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe File created C:\Autorun.inf 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe File opened for modification C:\Autorun.inf 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe File created D:\Autorun.inf 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe File opened for modification D:\Autorun.inf 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe 2588 ded.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2892 1968 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2892 1968 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2892 1968 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2892 1968 459707024783aa1babe7470fb05b5999_JaffaCakes118.exe 28 PID 2892 wrote to memory of 2588 2892 ded.exe 29 PID 2892 wrote to memory of 2588 2892 ded.exe 29 PID 2892 wrote to memory of 2588 2892 ded.exe 29 PID 2892 wrote to memory of 2588 2892 ded.exe 29 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21 PID 2588 wrote to memory of 1200 2588 ded.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\459707024783aa1babe7470fb05b5999_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\459707024783aa1babe7470fb05b5999_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\ded.exe"C:\Users\Admin\AppData\Local\Temp\ded.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\ded.exeStubPath4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD59254534bfa776fc07b5962a2ad6eb123
SHA1bd53776468e7c6c5b3dfce4085e62e82042342ec
SHA256bd222000d9d14e639a82665badeda11b30cf5e67230f49ae487df4e1e2a9db61
SHA5128738fa9ec843c030d3e9fc1c12ff4fb7490a620679fd7f54b7b7914f7a6c60ebda3c2426d7a4a16c7919f0845e3e09644df1133c7215737e858964ff4a7168dd
-
Filesize
66KB
MD5459707024783aa1babe7470fb05b5999
SHA10769bab8fa5b6d1017e5e6f527580dde18f161a0
SHA256161dc14ab6022dbb142adeba822af647463c61b56c363c327cff76dd7ea651e3
SHA51287407059b09a42e1e50c4a202c999ccfe6f195acce39ca41c32db5278574e33f436a30041b9c0b3f43819c281068daa549cea6cf708cd8e77561ff84c0c1771a
-
Filesize
9KB
MD5c8f55545987f2a2c2b127ae643967803
SHA142abd6d3cab0dff4037e2ae24ccd69b1a3eed750
SHA256284f3f125ef73f53c2472d1f7261c65b121510dd10ef1d2f601be8c5fea5b184
SHA512eb6e88e913a53482fe997923f99745cf9815f11ef81ad58e6380267fd9bfe9b5774c17a6229f2f44e3fcd195a5b0b37718b0b1dff2862687b241ff843466f83b