Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 17:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe
-
Size
118KB
-
MD5
6f37e56c2838e1d187d6c03496c482a6
-
SHA1
2ac7c565a2f714754c0d59ae5e343df888008a8c
-
SHA256
d04dcafd5b59d82adb14fe35c5ec55ac70bbee08b6d39913f7e23226190adc74
-
SHA512
23c3bbc56e1c1760757e3637af23631ac08ca55bdb4458a357f61352d9782ef8f02376eb75cd41c6802d775a98fd858a17b896fd92839383de7df96f868cd098
-
SSDEEP
1536:XlEnJGqvDsdU/szenCTO4Tm7XUXRNirEkthkZivdxP+HrwIWjWQgdSU6iUIIIBlp:oJGHdFzAFQR4oZ8H6wI37xr
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
Processes:
grouphost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 grouphost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 grouphost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE grouphost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies grouphost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
grouphost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" grouphost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" grouphost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix grouphost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
grouphost.exepid process 2160 grouphost.exe 2160 grouphost.exe 2160 grouphost.exe 2160 grouphost.exe 2160 grouphost.exe 2160 grouphost.exe 2160 grouphost.exe 2160 grouphost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exepid process 4848 6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exegrouphost.exedescription pid process target process PID 3532 wrote to memory of 4848 3532 6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe 6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe PID 3532 wrote to memory of 4848 3532 6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe 6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe PID 3532 wrote to memory of 4848 3532 6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe 6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe PID 4692 wrote to memory of 2160 4692 grouphost.exe grouphost.exe PID 4692 wrote to memory of 2160 4692 grouphost.exe grouphost.exe PID 4692 wrote to memory of 2160 4692 grouphost.exe grouphost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f37e56c2838e1d187d6c03496c482a6_JaffaCakes118.exe"2⤵
- Suspicious behavior: RenamesItself
PID:4848
-
C:\Windows\SysWOW64\grouphost.exeC:\Windows\SysWOW64\grouphost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\grouphost.exe"C:\Windows\SysWOW64\grouphost.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3708 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:2708