Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
-
Size
783KB
-
MD5
65dccf8a8e79cdffd9503b7bb02a214b
-
SHA1
05e5f36b30eea224f854512cc51711c0dd946cf4
-
SHA256
4652853b89746a272a790d68dab0d9928479deaf47b6e637d1527be88581c684
-
SHA512
2d04b9bc4050afde8f219735916baf27a1d0cdf68aec8d9c7cea856bb50c7da308d4377ce8f2ec58bdff0e5342ebfe697cec1bbd5e9f1fcb72c2be5375ab6662
-
SSDEEP
12288:78gvKPTYu3Rt1EzCT0r42brU/kcKXIMq0VumwNn6ciC:70TNRtm9nrU/YXSms7i
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
WScript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Protected.lnk WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Protected = "C:\\Users\\Admin\\AppData\\Roaming\\Protected.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exedescription pid process target process PID 2288 set thread context of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.execmd.exedescription pid process target process PID 2288 wrote to memory of 2148 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe cmd.exe PID 2288 wrote to memory of 2148 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe cmd.exe PID 2288 wrote to memory of 2148 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe cmd.exe PID 2288 wrote to memory of 2148 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe cmd.exe PID 2148 wrote to memory of 2644 2148 cmd.exe reg.exe PID 2148 wrote to memory of 2644 2148 cmd.exe reg.exe PID 2148 wrote to memory of 2644 2148 cmd.exe reg.exe PID 2148 wrote to memory of 2644 2148 cmd.exe reg.exe PID 2288 wrote to memory of 2640 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe WScript.exe PID 2288 wrote to memory of 2640 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe WScript.exe PID 2288 wrote to memory of 2640 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe WScript.exe PID 2288 wrote to memory of 2640 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe WScript.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe PID 2288 wrote to memory of 2692 2288 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe 65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Protected" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Protected.exe" /f & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Protected" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Protected.exe" /f3⤵
- Adds Run key to start application
PID:2644 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Protected.vbs"2⤵
- Drops startup file
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65dccf8a8e79cdffd9503b7bb02a214b_JaffaCakes118.exe"2⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
486B
MD52587877cb2996938e84649661163fda6
SHA1b1006953effd236ab7be0b929a1e872555c37695
SHA256238414d41f9d60a68b00842373a3a0b98b65737bb8ae0d47dc5cf7b5e675c96c
SHA51287b618f3add9d4ef833bce46ae2c8eeb3dd2598445676b1dffddb1971020994dcd0a8ae7ea05d3d1cbbe312787d2df76d5cf300f6efd65faeffb70c574d96d03