Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe
-
Size
238KB
-
MD5
4617a927c6fe71e0cb49fdb92ae6a625
-
SHA1
a28f7427ebeaf1e217767e70acfb657fd5c1c9a0
-
SHA256
cc65b15401fdf5e70146327c46075ed797ea45968a1bed4b11012ee35693ae1d
-
SHA512
78b1a54fe25da342e2840f6260700e82fa6982f277ab3ae5a83f5a12de10335b4922c182399d3a74deab5b17cdaaf10d2763f659f688ca7c36087850707d7adc
-
SSDEEP
6144:b2D0bYW3uGR3g4hdeuwksVFODxc1LLN8OA3:b2DHWemQOZsbODxc1Lm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2728 Firefox Utility.exe 2548 Firefox Utility.exe -
Loads dropped DLL 2 IoCs
pid Process 2824 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 2728 Firefox Utility.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mozilla Firefox = "C:\\Users\\Admin\\AppData\\Roaming\\Firefox Utility.exe" 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1936 set thread context of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 2728 set thread context of 2548 2728 Firefox Utility.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Firefox Utility.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Firefox Utility.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Firefox Utility.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main Firefox Utility.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Firefox Utility.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Firefox Utility.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Firefox Utility.exe = "11001" Firefox Utility.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 2548 Firefox Utility.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe Token: SeDebugPrivilege 2548 Firefox Utility.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 1936 wrote to memory of 2824 1936 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 28 PID 2824 wrote to memory of 2728 2824 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 29 PID 2824 wrote to memory of 2728 2824 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 29 PID 2824 wrote to memory of 2728 2824 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 29 PID 2824 wrote to memory of 2728 2824 4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe 29 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30 PID 2728 wrote to memory of 2548 2728 Firefox Utility.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4617a927c6fe71e0cb49fdb92ae6a625_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Firefox Utility.exe"C:\Users\Admin\AppData\Roaming\Firefox Utility.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\Firefox Utility.exe"C:\Users\Admin\AppData\Roaming\Firefox Utility.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD54617a927c6fe71e0cb49fdb92ae6a625
SHA1a28f7427ebeaf1e217767e70acfb657fd5c1c9a0
SHA256cc65b15401fdf5e70146327c46075ed797ea45968a1bed4b11012ee35693ae1d
SHA51278b1a54fe25da342e2840f6260700e82fa6982f277ab3ae5a83f5a12de10335b4922c182399d3a74deab5b17cdaaf10d2763f659f688ca7c36087850707d7adc