Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
69151a11fa04f698816a2e4b36a34f58
-
SHA1
93a7d4537f7b34105a2d5f59564dc9327ef2a072
-
SHA256
22d5447cace450971bac1055cac836686691a30e31880dbf1e66acd0c7c4e2df
-
SHA512
1dbbe3129bafb15cbb526e6f15e5ad64beedb5733fad6e064e66d1d298f86dd5383f4951f7652c51bbeb53ceb537510fef8be5e18fbb5a670f5672c967e4cf4f
-
SSDEEP
24576:IGk69IS0rw4pP9p41GXbT7koeZRh0NIVIg8EwpsQ35gdn5H7/bPwEjHly3H:Xkjrl341GHQo40WSg8EwsQ35gdnp7TPL
Malware Config
Extracted
Protocol: ftp- Host:
195.210.46.67 - Port:
21 - Username:
focuseye_wp - Password:
focuseye_33213!
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
FwRemoteSvr.exeFwRemoteSvr.exeFwRemoteSvr.exepid process 2184 FwRemoteSvr.exe 1476 FwRemoteSvr.exe 568 FwRemoteSvr.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1712-114-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral1/memory/2184-119-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral1/memory/2184-123-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral1/memory/1476-127-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral1/memory/2184-132-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral1/memory/568-136-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral1/memory/2184-139-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe -
Drops file in System32 directory 3 IoCs
Processes:
FwRemoteSvr.exeFwRemoteSvr.exeFwRemoteSvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WinMgmts:\ FwRemoteSvr.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ FwRemoteSvr.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ FwRemoteSvr.exe -
Processes:
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b0b000000010000001600000047006c006f00620061006c005300690067006e0000005300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802020f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe -
NTFS ADS 1 IoCs
Processes:
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\WinMgmts:\ 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
FwRemoteSvr.exepid process 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe 2184 FwRemoteSvr.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exepid process 1712 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
taskeng.exedescription pid process target process PID 1936 wrote to memory of 2184 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 2184 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 2184 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 2184 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 1476 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 1476 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 1476 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 1476 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 568 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 568 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 568 1936 taskeng.exe FwRemoteSvr.exe PID 1936 wrote to memory of 568 1936 taskeng.exe FwRemoteSvr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe"1⤵
- Modifies system certificate store
- NTFS ADS
- Suspicious behavior: RenamesItself
PID:1712
-
C:\Windows\system32\taskeng.exetaskeng.exe {9D123BE2-99DB-4133-B395-E288DB7BFE25} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exeC:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exeC:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1476 -
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exeC:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe
Filesize1.3MB
MD569151a11fa04f698816a2e4b36a34f58
SHA193a7d4537f7b34105a2d5f59564dc9327ef2a072
SHA25622d5447cace450971bac1055cac836686691a30e31880dbf1e66acd0c7c4e2df
SHA5121dbbe3129bafb15cbb526e6f15e5ad64beedb5733fad6e064e66d1d298f86dd5383f4951f7652c51bbeb53ceb537510fef8be5e18fbb5a670f5672c967e4cf4f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a88ed49871dc82b974e4c80e282eec12
SHA1b055ad24197d8c65b372424af7ad2b2ae02cd020
SHA25692a16f53a9a0dfee1c05a57496798c1b205e6336392d9d2fa2445764c46fa5f3
SHA51278b5d66a256112889bcbceddb7e70c72830b8d99f960c980cf8759a375f97d6e05d51df1aa073ea4029d312eaef3539c1f5bee00f3c03695f5cb52313dc571e7
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a