Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
7457f8093e70201177324a864177c0a0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7457f8093e70201177324a864177c0a0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7457f8093e70201177324a864177c0a0_JaffaCakes118.exe
-
Size
556KB
-
MD5
7457f8093e70201177324a864177c0a0
-
SHA1
6a2f85277ef38212be308b7ccf76903dff624984
-
SHA256
a6d3232aeb2e3c6005036fb2777a3ce55cabf39ab8af66c09676852eae567193
-
SHA512
73c387564059f6190c83283ba6ed7b662f337bb4bcd32046a72f8f0e77ca07281f6b25c404e1dafb38ce6cfa40aa009cae6f284aa0b1712b7b10e7b102fae17a
-
SSDEEP
6144:iiUDqX0CehPi+joO/zHWR8Hnk4sJL7JW35ZZu/qQj7/KX9327RALTVeuKnK6Zh:iA1e0m5U8Hn+uiqQj7/KX9GNQEuKnz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
RemD.exepid process 2716 RemD.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2536 cmd.exe 2536 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeRemD.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\hgfgihdgjyf = "\"C:\\Users\\Admin\\AppData\\Roaming\\RemD\\RemD.exe\"" 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\hgfgihdgjyf = "\"C:\\Users\\Admin\\AppData\\Roaming\\RemD\\RemD.exe\"" RemD.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RemD.exedescription pid process target process PID 2716 set thread context of 2500 2716 RemD.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeRemD.exepid process 1400 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe 2716 RemD.exe 2716 RemD.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeRemD.exepid process 1400 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe 2716 RemD.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
7457f8093e70201177324a864177c0a0_JaffaCakes118.exeWScript.execmd.exeRemD.exedescription pid process target process PID 1400 wrote to memory of 2104 1400 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe WScript.exe PID 1400 wrote to memory of 2104 1400 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe WScript.exe PID 1400 wrote to memory of 2104 1400 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe WScript.exe PID 1400 wrote to memory of 2104 1400 7457f8093e70201177324a864177c0a0_JaffaCakes118.exe WScript.exe PID 2104 wrote to memory of 2536 2104 WScript.exe cmd.exe PID 2104 wrote to memory of 2536 2104 WScript.exe cmd.exe PID 2104 wrote to memory of 2536 2104 WScript.exe cmd.exe PID 2104 wrote to memory of 2536 2104 WScript.exe cmd.exe PID 2536 wrote to memory of 2716 2536 cmd.exe RemD.exe PID 2536 wrote to memory of 2716 2536 cmd.exe RemD.exe PID 2536 wrote to memory of 2716 2536 cmd.exe RemD.exe PID 2536 wrote to memory of 2716 2536 cmd.exe RemD.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe PID 2716 wrote to memory of 2500 2716 RemD.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7457f8093e70201177324a864177c0a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7457f8093e70201177324a864177c0a0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\RemD\RemD.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\RemD\RemD.exeC:\Users\Admin\AppData\Roaming\RemD\RemD.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410B
MD5991cad69a8a5ac8e22281a335b88e2b3
SHA158568a006ade6e2ca7fa25673b036bcefa303a7d
SHA25695d975c5b36f23f9121390f8f4a1373b1cbb8045765e1c9fa68e114e2f592d60
SHA512298dc73384bf23e913f9a92e83040d84171ef86630652f82f73367fec9e6c61eb8a6055afe03d997870e529e4e88c0f9571b6da8ca934311afdbb67aca3132ba
-
Filesize
556KB
MD57457f8093e70201177324a864177c0a0
SHA16a2f85277ef38212be308b7ccf76903dff624984
SHA256a6d3232aeb2e3c6005036fb2777a3ce55cabf39ab8af66c09676852eae567193
SHA51273c387564059f6190c83283ba6ed7b662f337bb4bcd32046a72f8f0e77ca07281f6b25c404e1dafb38ce6cfa40aa009cae6f284aa0b1712b7b10e7b102fae17a
-
Filesize
79B
MD51ad4c722ea40342a7b08934c3e147255
SHA1a93eb053b356939a0bf3ac7931e129d29f945bfc
SHA256fa7edf519296e5473d73e80d0c9e564ee7b50f689230936b8fc28f5942a60ece
SHA512d42ccae2efbcbcac8a576f80eaf5eeff2ce39c0d967b9eb38cbd95bf539fc7c2cea89a65e63e36d223b4412172f92650518ced8f3fe1623c835c5ea7b1e12cd2