Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe
-
Size
40KB
-
MD5
6f964240dfa9be07d8954fb7d2bbaa5d
-
SHA1
ee621baba4cae18b3cf917f105da1e6270ea30a5
-
SHA256
3da546c3903fc1e24d072ada094646ca47a0184165364ea11f46559c02099aa1
-
SHA512
41f92bc526a16f61d1533ee0577cb6c066a57cb99764e67e064259c8d677ea2adf71e6e02b609ea44fc854b2d65345a4c5f3f63d57e373c70b6487d3b908b8ce
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHc:aqk/Zdic/qjh8w19JDHc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4788 services.exe -
resource yara_rule behavioral2/files/0x0009000000023438-4.dat upx behavioral2/memory/4788-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-39-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-108-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-160-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-166-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-167-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4788-178-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe File created C:\Windows\services.exe 6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe File opened for modification C:\Windows\java.exe 6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3844 wrote to memory of 4788 3844 6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe 84 PID 3844 wrote to memory of 4788 3844 6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe 84 PID 3844 wrote to memory of 4788 3844 6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f964240dfa9be07d8954fb7d2bbaa5d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
1KB
MD50f2f8f1652acbce09085b69940ad792f
SHA176fd8240a8525dc17018e3cfba8146e994def0db
SHA2562f12e4b9f4275917350ff64dc175bc5f7d12219b5665dfaca7118b10813e188e
SHA512bd06c18400476a363d46418428ddf562f245f9e4ca8b100eab0c274ef9b52fbc9e9b7a24aff4243ac454f231e7c2dd5aaf840068785e0a2ffa5a224505098f9c
-
Filesize
40KB
MD5fbef8ca0a699259069f922437472418e
SHA1ff20c39a6be60893c0aee63b7973b9e0d7388552
SHA2564049fb61acbdbec7718fe4f665a89224546bd41563127ad4b4eec36e3cdf5c9a
SHA512a279b2c761012ba44ed43eb7778a4a8c732322eea2e4db9507efa4276df747703bb40f28178b158fecff28499f470a64206f384e527f0feaa8046f7e12595f3a
-
Filesize
1KB
MD542c47ac44445603432aa705d6be24d5e
SHA17353133b691a512c81429d3dd9afdcfe642405a0
SHA25656aaedcbf044e90941f386354f11cb718bf1ce07235113711566a2b3399a5167
SHA512308c073a530f06952d9e1f4047621012e6755233221515e8f2e39c36f2b3f747f4dc450408e386611cda0baf6825a1bf0fcd9eead1bfbe240b8c33d997048f0b
-
Filesize
1KB
MD5a099ac290ad2b2c043dd0b962688de90
SHA1be970a05cfde21bc0d7becf83057b349a2fb6464
SHA2566546f5b4c22bc2b97c27bfa014d831aa161d685bb178a9511df257c492be784b
SHA512a07029ddea1be14338cd1c1aca55774b0be8e0af69fa9e5ee63a93cb6e058b70c83748ee58abe8b4af2249a44c8b0f89d3341b6ca0e1c263538432780aef8882
-
Filesize
1KB
MD52a3737b29a428abe7fb8f55a7717276a
SHA1803b65748ee3f2eecfdf8f78cd06c1314af0ac21
SHA256800636ea2a3bfe6926a59a91cb1c4cda0f15042f43845a1eedc00ca307458848
SHA5128b6573d96acbfb304393494476abdc7fb7116a7e98d56f0454c6c948831aa96ee71b71286c4158b1d3d1d69bf5dd35610b8eca6f7bcd2a71e4a97de01c6f0919
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2