Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 07:23
Behavioral task
behavioral1
Sample
6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Client.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Client.exe
Resource
win10v2004-20240508-en
General
-
Target
6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
6dbbc38e0855d4e72b4926d9e12598e6
-
SHA1
77afbbced59f720992f948e2fa81d2bda3692697
-
SHA256
9befa4ef0d9cf3068b4ed3d5e3771847aeedf74979a55c49e85a85eee1cb83a9
-
SHA512
1851e205793d3d57ac719dfb22eb3e0f8b0e170d0e650662007801cb4f64c48eea5a4338e861f69b06f909523f896631b2ec8831fbaebfad8ccd7230f3a69c9b
-
SSDEEP
24576:eqq1V8k+0keaB1CyKu2wmEC6IZgnPDSPE1J3HCP8uIhCZ:ejQw4M/u2wFpnPDIE1ZCP8ueO
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2412 Client.exe -
Loads dropped DLL 5 IoCs
pid Process 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0007000000014352-23.dat upx behavioral1/memory/2412-24-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-53-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-54-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-55-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-56-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-57-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-58-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-59-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-60-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-61-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-62-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-63-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-64-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-65-0x0000000000400000-0x00000000008A9000-memory.dmp upx behavioral1/memory/2412-66-0x0000000000400000-0x00000000008A9000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\HhSm\parameters.ini Client.exe File created C:\Windows\HhSm\debug.txt Client.exe File opened for modification C:\Windows\HhSm\debug.txt Client.exe File created C:\Windows\HhSm\parameters.ini 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe File created C:\Windows\HhSm\Client.exe 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2696 sc.exe 2768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2844 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2412 Client.exe 2412 Client.exe 2412 Client.exe 2412 Client.exe 2412 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 Client.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 348 wrote to memory of 1712 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 28 PID 348 wrote to memory of 1712 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 28 PID 348 wrote to memory of 1712 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 28 PID 348 wrote to memory of 1712 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 28 PID 1712 wrote to memory of 2584 1712 cmd.exe 30 PID 1712 wrote to memory of 2584 1712 cmd.exe 30 PID 1712 wrote to memory of 2584 1712 cmd.exe 30 PID 1712 wrote to memory of 2584 1712 cmd.exe 30 PID 2584 wrote to memory of 1636 2584 net.exe 31 PID 2584 wrote to memory of 1636 2584 net.exe 31 PID 2584 wrote to memory of 1636 2584 net.exe 31 PID 2584 wrote to memory of 1636 2584 net.exe 31 PID 348 wrote to memory of 2632 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 32 PID 348 wrote to memory of 2632 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 32 PID 348 wrote to memory of 2632 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 32 PID 348 wrote to memory of 2632 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 32 PID 2632 wrote to memory of 2696 2632 cmd.exe 34 PID 2632 wrote to memory of 2696 2632 cmd.exe 34 PID 2632 wrote to memory of 2696 2632 cmd.exe 34 PID 2632 wrote to memory of 2696 2632 cmd.exe 34 PID 348 wrote to memory of 2688 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 35 PID 348 wrote to memory of 2688 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 35 PID 348 wrote to memory of 2688 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 35 PID 348 wrote to memory of 2688 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 35 PID 2688 wrote to memory of 2844 2688 cmd.exe 37 PID 2688 wrote to memory of 2844 2688 cmd.exe 37 PID 2688 wrote to memory of 2844 2688 cmd.exe 37 PID 2688 wrote to memory of 2844 2688 cmd.exe 37 PID 348 wrote to memory of 2500 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 38 PID 348 wrote to memory of 2500 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 38 PID 348 wrote to memory of 2500 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 38 PID 348 wrote to memory of 2500 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 38 PID 2500 wrote to memory of 2768 2500 cmd.exe 40 PID 2500 wrote to memory of 2768 2500 cmd.exe 40 PID 2500 wrote to memory of 2768 2500 cmd.exe 40 PID 2500 wrote to memory of 2768 2500 cmd.exe 40 PID 348 wrote to memory of 2724 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 41 PID 348 wrote to memory of 2724 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 41 PID 348 wrote to memory of 2724 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 41 PID 348 wrote to memory of 2724 348 6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe 41 PID 2724 wrote to memory of 2628 2724 cmd.exe 43 PID 2724 wrote to memory of 2628 2724 cmd.exe 43 PID 2724 wrote to memory of 2628 2724 cmd.exe 43 PID 2724 wrote to memory of 2628 2724 cmd.exe 43 PID 2628 wrote to memory of 2656 2628 net.exe 44 PID 2628 wrote to memory of 2656 2628 net.exe 44 PID 2628 wrote to memory of 2656 2628 net.exe 44 PID 2628 wrote to memory of 2656 2628 net.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6dbbc38e0855d4e72b4926d9e12598e6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C net stop AdobeFlashPlayerHash2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\net.exenet stop AdobeFlashPlayerHash3⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AdobeFlashPlayerHash4⤵PID:1636
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C Sc delete AdobeFlashPlayerHash2⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\sc.exeSc delete AdobeFlashPlayerHash3⤵
- Launches sc.exe
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C TIMEOUT 22⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\timeout.exeTIMEOUT 23⤵
- Delays execution with timeout.exe
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C Sc create AdobeFlashPlayerHash binpath= C:\Windows\HhSm\Client.exe start= auto2⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\sc.exeSc create AdobeFlashPlayerHash binpath= C:\Windows\HhSm\Client.exe start= auto3⤵
- Launches sc.exe
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C net start AdobeFlashPlayerHash2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net.exenet start AdobeFlashPlayerHash3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start AdobeFlashPlayerHash4⤵PID:2656
-
-
-
-
C:\Windows\HhSm\Client.exeC:\Windows\HhSm\Client.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5baf2c6ff6a22b75e28d0181dad88c8b8
SHA198ba3a31f648ce0c4874e77444fab090e9742cd9
SHA256bd792fc304c010dc963dcec7083c2e7877fdd35f51b2a129e586d3464f698db0
SHA5120d773a9d6bb4fc96ccc813910c136eb636d59193ae86f0dfd274147798cfa40048196e34b72b7d149df24913d22c239c5cb609be539e2f8dc633f4579790862c
-
Filesize
223B
MD549cec6a3049fb57389b741649c4e609c
SHA15d8083cf3028c111e3936e1f78b00194c5e04288
SHA2569f313143048df4a358c6904659370408d4425733247fef8885f49c11b02b4f65
SHA5127cf0fdcaa55d6b4f48b224435e508cd29bca6737a8a2391e094a57ef9f1791c2c5c54f076fb2f991a378bb7ae71a818277d748756b7b3124e3e0dc5502fdde9c
-
Filesize
193B
MD577803e8762552660a93ea830f0da6487
SHA1fef71d9654b182d39ce3cdd220bd22a4f7662e2a
SHA25685af2b2ea060c27589dc84d590ea4cb0e36f5afbfb7bcfa095b00037b02a2b24
SHA51259a6b58e0535d4498bf17f3699bb55138aacc2dc68b73bba1b755365f885a0f23c04639146af7ec56ccf26793183fc004c1a70db27a6599d18474e8a38d6a0b3
-
Filesize
6KB
MD5b5a1f9dc73e2944a388a61411bdd8c70
SHA1dc9b20df3f3810c2e81a0c54dea385704ba8bef7
SHA256288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
SHA512b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8