Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe
-
Size
448KB
-
MD5
63c69afe79522f175ac1811470df2b0d
-
SHA1
e4720022b62f2e52c594b2c792094262f019bd9c
-
SHA256
256cf9b068c9db92d6a70ca4c3ce99c40a64a3571ec4743f282c65297ce5e1a5
-
SHA512
ebd00a9a9654d611f1969d69e253d09ba8ac41a3f2ca194706294e170a90a3ade47dc3551a468e7246ed81cf446b0763aa5c0327ea21a7a964a1f88e12da291f
-
SSDEEP
6144:d0PCRT5LgXEhN7th62W4hPpmM7wyxGV6jQ6100nmK1r8iw49cCiKkYxn:XgXEhxth62phxB7wyxGV6Z/4N49cCrRn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
installer.exepid process 2272 installer.exe -
Loads dropped DLL 1 IoCs
Processes:
63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exepid process 1804 63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
installer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main installer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
installer.exepid process 2272 installer.exe 2272 installer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exedescription pid process target process PID 1804 wrote to memory of 2272 1804 63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe installer.exe PID 1804 wrote to memory of 2272 1804 63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe installer.exe PID 1804 wrote to memory of 2272 1804 63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe installer.exe PID 1804 wrote to memory of 2272 1804 63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe installer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63c69afe79522f175ac1811470df2b0d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\DM\installer.exe"C:\Users\Admin\AppData\Local\Temp\DM\installer.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD563c69afe79522f175ac1811470df2b0d
SHA1e4720022b62f2e52c594b2c792094262f019bd9c
SHA256256cf9b068c9db92d6a70ca4c3ce99c40a64a3571ec4743f282c65297ce5e1a5
SHA512ebd00a9a9654d611f1969d69e253d09ba8ac41a3f2ca194706294e170a90a3ade47dc3551a468e7246ed81cf446b0763aa5c0327ea21a7a964a1f88e12da291f
-
Filesize
8KB
MD57681013beb29513fc0a90e74468d41bf
SHA19c6c1a8a847b0a1bff6a659e0b2b208f79518f1f
SHA2565db052b7a5d7e3651ebb6053fcfbc81e90c3e207b7b7f8cd2473668f3637cc3b
SHA512be6449f71e60d98080432c7aba14a68db0c7b6ff083295b2cd1d67e6f201b0566e446790b5041cdcd7f647d4d869379ec9ef1f0842910bab13852b6240582fbc