Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe
-
Size
277KB
-
MD5
7abb61412a064ced52fb6174352501d8
-
SHA1
51b2967bcbfb38ab1059eadf275b64fe9e0eedeb
-
SHA256
5e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd
-
SHA512
1ec6410bd09c081b6df36d27f101fcb60b870014fff09e2b3dd62107b5e2fa4f5cdb6213f5413d72abbdcc511f9b952229b39c5c5d9cc43b9625c485ecdee018
-
SSDEEP
6144:6xcrt7MGD4ekzeBIpV51pK0Yemmuf7Gsgr:6Ot7n4ekzF51g0YGuf7GNr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4448 winsvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\405068686303039040\\winsvcs.exe" 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\405068686303039040\\winsvcs.exe" 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\405068686303039040\winsvcs.exe 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe File opened for modification C:\Windows\405068686303039040 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe File created C:\Windows\405068686303039040\winsvcs.exe 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3168 568 WerFault.exe 89 3944 4448 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe 4448 winsvcs.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 568 wrote to memory of 4448 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 90 PID 568 wrote to memory of 4448 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 90 PID 568 wrote to memory of 4448 568 7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7abb61412a064ced52fb6174352501d8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\405068686303039040\winsvcs.exeC:\Windows\405068686303039040\winsvcs.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 5323⤵
- Program crash
PID:3944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 5882⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 568 -ip 5681⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4448 -ip 44481⤵PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3620 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD57abb61412a064ced52fb6174352501d8
SHA151b2967bcbfb38ab1059eadf275b64fe9e0eedeb
SHA2565e53e3b297d0bb71ccd27f879a4452489befd413d695c3007972015539020acd
SHA5121ec6410bd09c081b6df36d27f101fcb60b870014fff09e2b3dd62107b5e2fa4f5cdb6213f5413d72abbdcc511f9b952229b39c5c5d9cc43b9625c485ecdee018