Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe
-
Size
40KB
-
MD5
7a8247c355408eec79a0c0b887aab8b0
-
SHA1
ff0bfc6cdce05680310b4c93db4d022a5da967bc
-
SHA256
84a63bec3ac6c69f8ebcd6ca3baa58a6c69884d5e34e673031e919f91d742ab3
-
SHA512
79007c0005b25d82bdc75c7212b479ab9ec1739083bd70163f1b0f11c266f6c39ad6c00dc6465ad8df0ccd441a3f2d29dd3251a06807bb089a3637372512c489
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHJZc:aqk/Zdic/qjh8w19JDHJK
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 1056 services.exe -
Processes:
resource yara_rule C:\Windows\services.exe upx behavioral2/memory/1056-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-91-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-291-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-306-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-307-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-311-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-468-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-614-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1056-764-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exedescription ioc process File created C:\Windows\java.exe 7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe File created C:\Windows\services.exe 7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe File opened for modification C:\Windows\java.exe 7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exedescription pid process target process PID 5520 wrote to memory of 1056 5520 7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe services.exe PID 5520 wrote to memory of 1056 5520 7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe services.exe PID 5520 wrote to memory of 1056 5520 7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a8247c355408eec79a0c0b887aab8b0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5520 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
Filesize
147KB
MD53de270ea122229c6e504abffd82a0146
SHA1b137cfb4edab4c31979c7c987d50bccc0e6cfd4c
SHA2562abd8b7f3450199b809103d79c1077116e31bee589fbbf9efa0f93389f75b4c7
SHA512026846d9139156c8a74f69af36e0df3c5f4acd564d5087f0f67627175f7ce5532a0d1d6f5719f8ae6439b9add5a069e281fcff3fa5aa2113b0acd5c144d587ff
-
Filesize
304B
MD5267ddfdbb8d492b25de208d84b290f1c
SHA19f57d9f19f25549e1232489a0c101a92e851de2f
SHA256ef1f87447ae1ab45548d2934cf0dbd15a32b86359ff9fccfa48d76c1badf6586
SHA5120709aa62d39d419d335183235dcf328e1dfe6997bd9bfbdeb01bb050df8dcab63ec2d4f46e4718ab389fa8e12af66dec2e3019c8871ac6e40927a25cb706c6b3
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
152KB
MD5e5da6afdffa984ca84169afedf359c80
SHA1750899a82a6bef91d2b12fea2d01eb619ad79e8d
SHA256d55a82b782221466bad06a1f65b39acffcdc47c2561cec0a49e934b2bd929e16
SHA5125d39410588f6fedafd0ccff9e040ed379ebe0df091714404e78a3766e4356a7233c98111487e1694256fa02dc974a26b2623c9100e79ed4231c46d68a9f6ff5a
-
Filesize
141KB
MD52d4f62786b8fd3d73269a2e26b414b10
SHA1bd4cfc73d073dbf59b95963fa1b016b487edfd88
SHA256870ee3a803fe059e9d450a79b92c69df463ec78cd88bcade35f1260c0c6ad12d
SHA512e225b0e491aa826fe102c954c216ce51835e46a7c50c38d1eb72d70007ad0ebdcd9457e3ac3fae839bcaf5cc553fb4993f35e5b8d382964d7e759bef2563e021
-
Filesize
115KB
MD52f95d8a228d227b2a861c7d43646b6e4
SHA1035362e2870ef52e40532d02f49841a549daa371
SHA256154c4672257cbbe76fae81186a9772682b9497e5b77adc81672b9659080e7bf2
SHA51258679f161b9cedee316797c221136a2b22934244f7c61af0e027f6192b35ea12bbef802d00bcb97d81751d092f7e6c986b7d39b9fd34007898864107adc50179
-
Filesize
101KB
MD54c8d4322d597fee089c9ec9d35123e0c
SHA1026515a76a173aeebed9d08fd1a5417d9f338fc0
SHA256e2b072148b4a4388ec06cb902501b3058496004dcb003ff6c537cc5691e08c24
SHA512ccbf41c639fa743069e4e791238d150bd9d0a66d32d5693315dcb60b793fa079c5684f5b71102801ecabe7d22dfc0da50b6be0827668feef002fc47f08733f5d
-
Filesize
315B
MD514b82aec966e8e370a28053db081f4e9
SHA1a0f30ebbdb4c69947d3bd41fa63ec4929dddd649
SHA256202eada95ef503b303a05caf5a666f538236c7e697f5301fd178d994fa6e24cf
SHA512ec04f1d86137dc4d75a47ba47bb2f2c912115372fa000cf986d13a04121aae9974011aa716c7da3893114e0d5d0e2fb680a6c2fd40a1f93f0e0bfd6fd625dfa7
-
Filesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
Filesize
141KB
MD561365ec6b72ce9096343cd666f2e5eaa
SHA1569a4db9f70169442585ecd6a6e2a7fd4469cdd8
SHA256b4990d53bfb8dc4d1bb3c556a170fdee2bf51398230d2d04bd77e474a0dd6093
SHA5128f8384facfc81988c028e586e583406a5684404dd9b2dc0afb0ea1432c400d67432aefe3e67700698fd3e24b87aa47f3e1e9a755e4168272a09937fa9c84c4db
-
Filesize
96KB
MD56566de1c5b3996b633bfdfdbac814bc5
SHA1c8539863d6d157729d6662be8620246bb3a82d71
SHA256e53d4149cc676a08054f1dbd17acac7e4cd8407e450e2470e35679ce99021c03
SHA512debd914c1fe05666304a6b960561e9ca951ad3003ec9d9b691651e3d2682aa969e52dd43e8b21f0a5413f456e59b4480e786dcc1c63ab7a06af12e4e92a99609
-
Filesize
114KB
MD5cccb2c369721773186b3b228ca8dd649
SHA1104c41cc2e7107d7b8e26770a2899b48f3ffe489
SHA256bc4e9a3d1a2a35c581ddc4f87674cf053b77d3310e00f1b3e1993f6cc391aeda
SHA512710ae15cd38831b25e02655684a867f40f3d503824435baa35d7aebc3d0915a9c7df188c176b9a701fa14aaa9715fbe7775de38be25aa9b696ed2303b9c5ced5
-
Filesize
152KB
MD52952e41dd090e779c077298ed92c876a
SHA1383f38eccb7ff5e691116fe232e54c84e0e71b24
SHA256e75ec2421ad5a0c9bdf41db25fa9e557cf19c804878fe055942dfc75a1b7ce89
SHA512126d161ceff974ecf3cc426988a96719e9f2f9484aa737a4bea0434347b30827f7e9eb079f30db2e59afb92fc9a39659ea532334cc68b6d08f9126fd2031eab5
-
Filesize
102KB
MD5d69d722dde609961dfb0360a81294a06
SHA1b20e5d7bf19b4e7345ea7bf9ba680ea8ca668483
SHA25696374b2291fbea63d5aaea9d10dbaa32c996dba1277ab354873b97e08df0670e
SHA512200fdb73f7d19473e77304a45429f22b5f9c04e2c357954c7b45db6bd6bb7bcc1be1aeb6e0cb467cf57aca797be6a8b473fc05c4907399f9df2ceddb0cd87d9b
-
Filesize
175KB
MD5819efaea4516150780012c0da9067a68
SHA142c29d8e089d8db23584ed4f3681d7bf769d74eb
SHA2560d9e6274edef3e34b06c89553f1f361b64de16356b381a5148a88db81c978413
SHA5121beb7ffe2bdcb5e4a74b38140b23284e3fd76e153a66a50f41adf3deef6f545108cb57950c17f5d2aebd21db808eb5c4ea1e16c0ad776a50f6eaaf5dc0602660
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
109KB
MD58b8b6f342d72475750a00feda47029cf
SHA1fc6181d1a23c847fa07890b917e680e8739bdf70
SHA256b49a455fe381aa645981c7d236f94d9dd174cc2f3216c23d75dcbaf08b4d8d14
SHA5120bd843df9d565b676801fdbff42addeecda5196230994d2f29f706326abf7236fddecb80c551abb01d70cec8f0c0a72082c168502d4a22be5d6c9050b9b3ba7f
-
Filesize
112KB
MD5b13634000f63c04711a22a6091eb8102
SHA12dee37f8e44fe5dc4aa7d192a495c7b4007475e2
SHA25690ce23831a4adf6a982aac8f867e3cf984ac74f910f204aeb53b7a4307795f00
SHA512ab0186d3712e8acb10a0d646a47f029c2f0975d6e7551562efa2c0a6797203b2ec31abb71344cdccc11504b48a9a5f6f433c093c48c0e6e8475c7067e16aba64
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
40KB
MD55f49becbb8d91586237cc831ea44eb6c
SHA1d1bf53893543d34c0a8d80ed1813d566a233ef33
SHA256507daf0b8bc6002dc3816ba92dc907e365996c62804842f89147d9f9d43d0c7f
SHA512e85796ffa04237beb9f71d6951f0b67a48f75843fd49254af7bb1f89ae228904a1b9b9b89fae05445608a2e0ad0e4b66cc845c4294e5be37ac6d0a2a223f01f4
-
Filesize
1KB
MD54288a3999e0a70259559b0adbf9945ac
SHA1ccafb1de66ecaba0bc9f03dc01cfa3d583d5e973
SHA256c96b8f76ae326ed7f27b4fdcbd3b4b5879218d26532b2c96d5cf7a298304ca6f
SHA512639e9cf4e9e04d88d0a5a1d85f9722f98a5295ed579f4de88f4c0f74ba768b07c4f00cea385faed9be7e7f2251767d2df586184f64a29a140e05922e60c90ff1
-
Filesize
1KB
MD55f9e36aacea69b5a96018e6bbf1be40a
SHA14345a54a209e15583d6dacd4e161976c437c9da2
SHA256c18361a369cc55e573b77326cc9a6b842fd5bf30e9ac596f9c39e315fe8bc41c
SHA512a544484a1e478a9dd53c26a55e0afec0fe7cbf8cdc83b9bb2a41ab444eb266a415308dc7d291950aef8a9ed92a38b490b376eac284b86a9fb363242a6d1b6ba0
-
Filesize
1KB
MD518ae00e6a06ec48ee9dfd18bbc07c038
SHA1d0e010216f738d00999d66a3854e079d4786d18e
SHA2562656d9b72cf52be5842d47d6ffa6aada8e7dde8642f296ba173de3cebc1096b4
SHA5122ebd9ea525b70e2e7d9231990e6f4e5754a9b505f67ca732458f5985c56a8edb5cfffd52a41e24cc7cc4c86906161a0838b3566c2ba6e8e5b901e555e7290cb7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1KB
MD5e77c5f3bf6801e3a991a72cfd8543fb3
SHA106e9754ab1db55ed971576ef60c614faedae8a5a
SHA256af510d483836f7186845f71c166e9cdfec508262e8ce81555d948d386f540f09
SHA512c4b62365d80c9fe5bef933b08a1e8abbf0ddb0265c198da98bc44fa4f66213b7a34df33595a62cc4b1f0227c5104f8398d5801c2e0ae777c10a92bb8a2f6a8cb
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2