Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
6e75b846207c166f882226e6ffb7c000
-
SHA1
94ca9238a4888754df1f7e0cef0d4cab6f1eef24
-
SHA256
3b5402a65f8301b97bfc1dc276b97f695ec7cb44efc1e941ed0f4778eda26fa6
-
SHA512
166321f32b0196bc5577f13e72e3b4d4db6c5fcd95423b639711c18e4d7bb767f6e98fa905aa1cc8195e262c56bce3ac46e9e80b569ea076a29973f20aec9bbe
-
SSDEEP
24576:kO0N1KqkD77mkJxTjloSVpXcgs4hI/twQ/:5YE1T+ONWD
Malware Config
Extracted
pony
http://199.192.25.237/~catchusnot/panel/gate.php
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Wservices.exeWservices.exeWservices.exeWservices.exeWservices.exepid process 2512 Wservices.exe 1608 Wservices.exe 2036 Wservices.exe 1476 Wservices.exe 2400 Wservices.exe -
Loads dropped DLL 15 IoCs
Processes:
6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exeWerFault.exeWerFault.exepid process 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe 1204 WerFault.exe 1204 WerFault.exe 1204 WerFault.exe 1204 WerFault.exe 1204 WerFault.exe 1204 WerFault.exe 1204 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Wservices.exeWservices.exedescription pid process target process PID 2512 set thread context of 2036 2512 Wservices.exe Wservices.exe PID 1476 set thread context of 2400 1476 Wservices.exe Wservices.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1204 2036 WerFault.exe Wservices.exe 1676 2400 WerFault.exe Wservices.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2748 AcroRd32.exe 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exetaskeng.exeWservices.exeWservices.exeWservices.exeWservices.exedescription pid process target process PID 2244 wrote to memory of 2748 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe AcroRd32.exe PID 2244 wrote to memory of 2748 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe AcroRd32.exe PID 2244 wrote to memory of 2748 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe AcroRd32.exe PID 2244 wrote to memory of 2748 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe AcroRd32.exe PID 2244 wrote to memory of 2452 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe schtasks.exe PID 2244 wrote to memory of 2452 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe schtasks.exe PID 2244 wrote to memory of 2452 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe schtasks.exe PID 2244 wrote to memory of 2452 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe schtasks.exe PID 2244 wrote to memory of 2512 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe Wservices.exe PID 2244 wrote to memory of 2512 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe Wservices.exe PID 2244 wrote to memory of 2512 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe Wservices.exe PID 2244 wrote to memory of 2512 2244 6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe Wservices.exe PID 2416 wrote to memory of 1608 2416 taskeng.exe Wservices.exe PID 2416 wrote to memory of 1608 2416 taskeng.exe Wservices.exe PID 2416 wrote to memory of 1608 2416 taskeng.exe Wservices.exe PID 2416 wrote to memory of 1608 2416 taskeng.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2512 wrote to memory of 2036 2512 Wservices.exe Wservices.exe PID 2036 wrote to memory of 1204 2036 Wservices.exe WerFault.exe PID 2036 wrote to memory of 1204 2036 Wservices.exe WerFault.exe PID 2036 wrote to memory of 1204 2036 Wservices.exe WerFault.exe PID 2036 wrote to memory of 1204 2036 Wservices.exe WerFault.exe PID 2416 wrote to memory of 1476 2416 taskeng.exe Wservices.exe PID 2416 wrote to memory of 1476 2416 taskeng.exe Wservices.exe PID 2416 wrote to memory of 1476 2416 taskeng.exe Wservices.exe PID 2416 wrote to memory of 1476 2416 taskeng.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 1476 wrote to memory of 2400 1476 Wservices.exe Wservices.exe PID 2400 wrote to memory of 1676 2400 Wservices.exe WerFault.exe PID 2400 wrote to memory of 1676 2400 Wservices.exe WerFault.exe PID 2400 wrote to memory of 1676 2400 Wservices.exe WerFault.exe PID 2400 wrote to memory of 1676 2400 Wservices.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e75b846207c166f882226e6ffb7c000_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ICOBOX PROPOSAL.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc minute /mo 1 /tn "'6e75b846207c166f882226e6ffb7c000_JaffaCakes118'" /tr "'C:\Users\Admin\AppData\Roaming\Wservices.exe'"2⤵
- Creates scheduled task(s)
PID:2452
-
-
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 1564⤵
- Loads dropped DLL
- Program crash
PID:1204
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {121B2CC2-94A9-4107-BF45-7032009356B0} S-1-5-21-3452737119-3959686427-228443150-1000:QGTQZTRE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Roaming\Wservices.exeC:\Users\Admin\AppData\Roaming\Wservices.exe2⤵
- Executes dropped EXE
PID:1608
-
-
C:\Users\Admin\AppData\Roaming\Wservices.exeC:\Users\Admin\AppData\Roaming\Wservices.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\Wservices.exe"C:\Users\Admin\AppData\Roaming\Wservices.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 1564⤵
- Loads dropped DLL
- Program crash
PID:1676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
495KB
MD5660380474df2fa5a174e3a25b680fff6
SHA159c78b29da6b1441e5b6a8196abf320e67113510
SHA25679b2b935f1b6ec7474663ce9a9011954feca17b740ce921c34fe6ac4469bcb92
SHA51243c20cd8d01a773ae935e3b1bed767ff3e8983ccffdca87b46c919eb62c0364cc81c312439a2b67fa46eaa4460a7ea54f91910b9255f8b64eacb36fead8ceec3
-
Filesize
3KB
MD51322c6658e3b5e5aa9f1062567d0499d
SHA12f629049957876f75681a07fb8b8ed99baa38d27
SHA256bc03c5135e2ae1be6565b4f7a8b62c3df3e4d6780ee7ac98d66c666f346ba126
SHA5126351efb7085bb3589fbdf243f7857629c33304e013bedfa0a59036596e53556fb799b6bb2d9fe6ddbc4d5d3bfc35bb474c320a36698fb0f52852c4b57dfa1cdc
-
Filesize
1.1MB
MD56e75b846207c166f882226e6ffb7c000
SHA194ca9238a4888754df1f7e0cef0d4cab6f1eef24
SHA2563b5402a65f8301b97bfc1dc276b97f695ec7cb44efc1e941ed0f4778eda26fa6
SHA512166321f32b0196bc5577f13e72e3b4d4db6c5fcd95423b639711c18e4d7bb767f6e98fa905aa1cc8195e262c56bce3ac46e9e80b569ea076a29973f20aec9bbe