Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
69151a11fa04f698816a2e4b36a34f58
-
SHA1
93a7d4537f7b34105a2d5f59564dc9327ef2a072
-
SHA256
22d5447cace450971bac1055cac836686691a30e31880dbf1e66acd0c7c4e2df
-
SHA512
1dbbe3129bafb15cbb526e6f15e5ad64beedb5733fad6e064e66d1d298f86dd5383f4951f7652c51bbeb53ceb537510fef8be5e18fbb5a670f5672c967e4cf4f
-
SSDEEP
24576:IGk69IS0rw4pP9p41GXbT7koeZRh0NIVIg8EwpsQ35gdn5H7/bPwEjHly3H:Xkjrl341GHQo40WSg8EwsQ35gdnp7TPL
Malware Config
Extracted
Protocol: ftp- Host:
195.210.46.67 - Port:
21 - Username:
focuseye_wp - Password:
focuseye_33213!
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
FwRemoteSvr.exeFwRemoteSvr.exeFwRemoteSvr.exepid process 4924 FwRemoteSvr.exe 2652 FwRemoteSvr.exe 4072 FwRemoteSvr.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1688-20-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4924-24-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4924-26-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4924-28-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/2652-32-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4924-35-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4924-37-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4072-40-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4924-41-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe behavioral2/memory/4924-43-0x0000000000400000-0x0000000000704000-memory.dmp autoit_exe -
Drops file in System32 directory 3 IoCs
Processes:
FwRemoteSvr.exeFwRemoteSvr.exeFwRemoteSvr.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WinMgmts:\ FwRemoteSvr.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ FwRemoteSvr.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ FwRemoteSvr.exe -
NTFS ADS 1 IoCs
Processes:
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\WinMgmts:\ 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
FwRemoteSvr.exepid process 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe 4924 FwRemoteSvr.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exepid process 1688 69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69151a11fa04f698816a2e4b36a34f58_JaffaCakes118.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
PID:1688
-
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exeC:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exeC:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2652
-
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exeC:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\amd64_dual_netevbda.inf_31bf3856ad364e35_10.0.18362.1_none_0282c0892fb67555\FwRemoteSvr.exe
Filesize1.3MB
MD569151a11fa04f698816a2e4b36a34f58
SHA193a7d4537f7b34105a2d5f59564dc9327ef2a072
SHA25622d5447cace450971bac1055cac836686691a30e31880dbf1e66acd0c7c4e2df
SHA5121dbbe3129bafb15cbb526e6f15e5ad64beedb5733fad6e064e66d1d298f86dd5383f4951f7652c51bbeb53ceb537510fef8be5e18fbb5a670f5672c967e4cf4f