Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
6d25483cd59582da7258e584be660fde_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
8 signatures
150 seconds
General
-
Target
6d25483cd59582da7258e584be660fde_JaffaCakes118.exe
-
Size
144KB
-
MD5
6d25483cd59582da7258e584be660fde
-
SHA1
f322cf004aa269ce6dedad5ada81bcfdae86b687
-
SHA256
31f3340b9cb9d2f1a829c905da3f5adb78c83f2a082e4e7f6430f9cb9039e689
-
SHA512
bf185baf958285c231f7033407df7368ccabe41e2cbaecfc50c2227c2658fcd822ebca828a1c7652c1c1d3cd487226f43e00dae42b9cca59a9de5088812b8de7
-
SSDEEP
3072:ox9PrkoQSsdBb74jipqV7SDRRbQ9X1aOq5hBYtHyk:oXQoHMnAVuDRRbAjyk
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
alabamanetserv.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 alabamanetserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE alabamanetserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies alabamanetserv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 alabamanetserv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
alabamanetserv.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" alabamanetserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix alabamanetserv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" alabamanetserv.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
alabamanetserv.exepid process 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe 4360 alabamanetserv.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
6d25483cd59582da7258e584be660fde_JaffaCakes118.exepid process 4012 6d25483cd59582da7258e584be660fde_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6d25483cd59582da7258e584be660fde_JaffaCakes118.exealabamanetserv.exedescription pid process target process PID 1020 wrote to memory of 4012 1020 6d25483cd59582da7258e584be660fde_JaffaCakes118.exe 6d25483cd59582da7258e584be660fde_JaffaCakes118.exe PID 1020 wrote to memory of 4012 1020 6d25483cd59582da7258e584be660fde_JaffaCakes118.exe 6d25483cd59582da7258e584be660fde_JaffaCakes118.exe PID 1020 wrote to memory of 4012 1020 6d25483cd59582da7258e584be660fde_JaffaCakes118.exe 6d25483cd59582da7258e584be660fde_JaffaCakes118.exe PID 1500 wrote to memory of 4360 1500 alabamanetserv.exe alabamanetserv.exe PID 1500 wrote to memory of 4360 1500 alabamanetserv.exe alabamanetserv.exe PID 1500 wrote to memory of 4360 1500 alabamanetserv.exe alabamanetserv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d25483cd59582da7258e584be660fde_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d25483cd59582da7258e584be660fde_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\6d25483cd59582da7258e584be660fde_JaffaCakes118.exe--15b300f92⤵
- Suspicious behavior: RenamesItself
PID:4012
-
-
C:\Windows\SysWOW64\alabamanetserv.exe"C:\Windows\SysWOW64\alabamanetserv.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\alabamanetserv.exe--2a2dbfbc2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4360
-