Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
693d16878296d10d4609d9f9c277babd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
693d16878296d10d4609d9f9c277babd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
693d16878296d10d4609d9f9c277babd_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
693d16878296d10d4609d9f9c277babd
-
SHA1
8944a160cb223b3998ed95fbe8c2a3a5c5993eef
-
SHA256
982568fb61e27b7f208c1570ee1b11593c9892187b5ef8a41697ed516dcf838f
-
SHA512
4a8f808d864b38abf6330091d2519130a26074d1b2924b02cdbc9a646e4b6f49da6c9b13c069f161a546c666e62cc08391f2fa4306ca07147ad0cf76ee3f7ce0
-
SSDEEP
24576:nAHnh+eWsN3skA4RV1Hom2KXMmHae3h/BhURGV/K5ajc5:ah+ZkldoPK8YaeR/nUhaO
Malware Config
Extracted
Protocol: ftp- Host:
91.121.121.25 - Port:
21 - Username:
k1 - Password:
6E4o4U7d6E4o4U7d
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
crtdll.execrtdll.execrtdll.exepid process 2656 crtdll.exe 3340 crtdll.exe 2308 crtdll.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4352-6-0x00000000006F0000-0x0000000000825000-memory.dmp autoit_exe C:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exe autoit_exe -
Drops file in System32 directory 3 IoCs
Processes:
crtdll.execrtdll.execrtdll.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WinMgmts:\ crtdll.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ crtdll.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ crtdll.exe -
NTFS ADS 1 IoCs
Processes:
693d16878296d10d4609d9f9c277babd_JaffaCakes118.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\WinMgmts:\ 693d16878296d10d4609d9f9c277babd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
crtdll.exepid process 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe 2656 crtdll.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
693d16878296d10d4609d9f9c277babd_JaffaCakes118.exepid process 4352 693d16878296d10d4609d9f9c277babd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\693d16878296d10d4609d9f9c277babd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\693d16878296d10d4609d9f9c277babd_JaffaCakes118.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
PID:4352
-
C:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exeC:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
C:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exeC:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3340
-
C:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exeC:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2308
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\x86_netfx-shfusion_dll_b03f5f7f11d50a3a_6.1.7601.22733_none_186920d0a287a16e\crtdll.exe
Filesize1.2MB
MD5693d16878296d10d4609d9f9c277babd
SHA18944a160cb223b3998ed95fbe8c2a3a5c5993eef
SHA256982568fb61e27b7f208c1570ee1b11593c9892187b5ef8a41697ed516dcf838f
SHA5124a8f808d864b38abf6330091d2519130a26074d1b2924b02cdbc9a646e4b6f49da6c9b13c069f161a546c666e62cc08391f2fa4306ca07147ad0cf76ee3f7ce0