Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
b09e4723471348175bce0a07a7675476_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b09e4723471348175bce0a07a7675476_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240611-en
General
-
Target
b09e4723471348175bce0a07a7675476_JaffaCakes118.exe
-
Size
98KB
-
MD5
b09e4723471348175bce0a07a7675476
-
SHA1
fd2caff58a288248ce721f1cfdcb116dbd5b8677
-
SHA256
5a80f6f31674a3a055d5a51039b0d4fc0efec29f0854de24266e9028e15f81d2
-
SHA512
9e7e9de4671af8ad73104562beb0a5131b30d84f0e44e7d061d837773d4a72ed8ab166607baf96f23690e8bab9efba2a5a761443fcaa64645df6a1d0b7558a36
-
SSDEEP
3072:gw4gnScGuDI2dcTzQEpn0keRvuqpmEqNNiHI+dyVhQ:gz2guluBESQo+8Q
Malware Config
Extracted
smokeloader
sp30
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Loads dropped DLL 2 IoCs
pid Process 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b09e4723471348175bce0a07a7675476_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2664 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2664 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe 28 PID 2752 wrote to memory of 2664 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe 28 PID 2752 wrote to memory of 2664 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe 28 PID 2752 wrote to memory of 2664 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe 28 PID 2752 wrote to memory of 2664 2752 b09e4723471348175bce0a07a7675476_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b09e4723471348175bce0a07a7675476_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b09e4723471348175bce0a07a7675476_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\b09e4723471348175bce0a07a7675476_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b09e4723471348175bce0a07a7675476_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
9KB
MD513b6a88cf284d0f45619e76191e2b995
SHA109ebb0eb4b1dca73d354368414906fc5ad667e06
SHA256cb958e21c3935ef7697a2f14d64cae0f9264c91a92d2deeb821ba58852dac911
SHA5122aeeae709d759e34592d8a06c90e58aa747e14d54be95fb133994fdcebb1bdc8bc5d82782d0c8c3cdfd35c7bea5d7105379d3c3a25377a8c958c7b2555b1209e