Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 17:42
Static task
static1
Behavioral task
behavioral1
Sample
af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe
-
Size
40KB
-
MD5
af9bb29a99d8305669087ed6b33de18e
-
SHA1
1bab8fa39b92db16090a87cfcc3491f1b1c5d33c
-
SHA256
2902288bc854de345ebe57cf0d8b2ba7dcfaf153c962468ba8a1886cde71f66a
-
SHA512
0066056b754bda319cb8e3c3cebf34884844b15849495d96a6c0a87f23546e2647c6a24468131fdf4b9e4d5971cbae8b71453f1ce93c2bb27f05db0b7d73ec12
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHeNJ:aqk/Zdic/qjh8w19JDH+
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 4300 services.exe -
Processes:
resource yara_rule C:\Windows\services.exe upx behavioral2/memory/4300-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-81-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-412-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-455-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-458-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-462-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-549-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-552-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-706-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-739-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4300-751-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exedescription ioc process File created C:\Windows\services.exe af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe File opened for modification C:\Windows\java.exe af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe File created C:\Windows\java.exe af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exedescription pid process target process PID 2504 wrote to memory of 4300 2504 af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe services.exe PID 2504 wrote to memory of 4300 2504 af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe services.exe PID 2504 wrote to memory of 4300 2504 af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\af9bb29a99d8305669087ed6b33de18e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E9YVC3IR\E2G4TYJC.htmFilesize
185KB
MD5cdada4ed3b1a6aa4bbee231f8971152c
SHA1d358f23bf1af370969bac65c6089d720c92bb2c9
SHA256a027624f2d71e3b1480bbd501c89595edb128d6e1a16eaa6f03d900db89ee58f
SHA5126270e2ecbfedb1d51f230f42cab9408a838875913ebdc9cd47f0774df918d541b6f1d228b8664673889415f5f87d9babca096dd69b94336261d77567c5ecb5ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E9YVC3IR\searchZEY52NDC.htmFilesize
150KB
MD5ac5f3185184458ca654f287afa9230fa
SHA16a3c772ec2117bac65c56f916584cc99b77ecd96
SHA2561952c689b875050fdf3793f58fc6447550b82202573a93fbca97b2ac058dc898
SHA512ad7b52fc08f12e73f7d92c11775316e7d8ec33b769ce64daf96bbe269dc924fbf10b3434f65f800b3a479e0c947f24103d54298db6f164360c3a04499a1ec1d0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G7AAJOBN\results[2].htmFilesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G7AAJOBN\search6IFVMJFA.htmFilesize
128KB
MD578f956ebe772db28480f34aeb24f79b8
SHA1a7f7f99a9c076b5b368f523dbb30e4af74ef2f15
SHA256c5e67be970c32cec30ede054e97c76e6af2cc024393cd7dde8a28eceabc808e4
SHA512150f3d7c5d9be62972f0ab9135e98373fb84994597d67f8857ae4d2c605449edcd54c4d952edf7501bc5e9cdaa9c54689445b0516c2775fe59a297a8a1b70a90
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G7AAJOBN\search770IEGKQ.htmFilesize
118KB
MD5e1afc2af83ddba77f32bfb34c8769125
SHA18cc71d342f4e2d71d215e701d7d33d91bcb56456
SHA256c095973cdefca79652257892e619ce0fb25341a35a732f506f7a7930f752a331
SHA512f791e5ae3520881a6c5f4855b9fdb0db84a36aa2193fc5c1db12240f2171dfd803e0f167810429d5d646ceb43d929fff47bae61de492f46896218c24db28850c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G7AAJOBN\search[10].htmFilesize
137KB
MD5354d0c0bb1452845aaa2c7dca9763066
SHA13861a12317fe4fabdbc707cd24571b4fce759ec8
SHA25670d5e9bafe4d0d35a44ea5a513564061ee22d31c0410ec5117e0e5ed258e3b96
SHA5121b7d7a4868f877888a28dd6b1659278800fe94f923c42d097719ff3d5d772d8754a6f335e35deeeaa751a4b07e01c2e6d9c458de44a64e742a17ce5ec9c68254
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G7AAJOBN\search[2].htmFilesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G7AAJOBN\search[3].htmFilesize
113KB
MD597a0755700342ef5fcef92c96381d942
SHA1afadba3ba10f500f7dd2f57a64cb147ae84d3a0a
SHA25654c2ec0d0262a5c5ce7ba40e1c672b5fbd481cad8420a7fe916a00485fd7d5de
SHA512f0b63a82558f0ee7a05f71ed676f9e659ca50cb42b14a6999011a526ef3a788c7626289bc6461746e07954f5c7a5d36b610e5c875169601b086e72a4c80ff7e9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\REQ5K173\HNYNQ7Y4.htmFilesize
185KB
MD59ee65211970f90eb1bace578756d4ad6
SHA1b5faa69c75a5618ad5e7ce908d11a3dc02da5258
SHA256fc6c4f0843aa390859a738b966ebd7317d21c28b1420a759f519e798725c81f8
SHA5125b9dc2e316aa69ee6f70edf75a430e9150fb61dcda3c1d6b0abf0ce9209e550717f3f6e3246be56d1ca0504c8169ddc0f525c7df384860fce53b65c2448213cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\REQ5K173\search[8].htmFilesize
130KB
MD5f38f268cce37f454084f0634a2a01daf
SHA1313fa37151275d81481538241438322cb6b192c5
SHA256e4bbddb9fd3c72e832f9b1866730ca85bf1b125cd8e37785c455d95aef2c7df7
SHA51235644cbb0a906f0b7542e3565541913333478e60a48eb50d38f2572c0b90184f769504f4020a4d064aad8c6da746fea9e4447a66f7bac0b5c6bed5a46055c307
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XIQH11PJ\results[3].htmFilesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XIQH11PJ\searchR0V67B8E.htmFilesize
132KB
MD5091b1a29884d1a606a5ffd0e91c04f8b
SHA1b600fb4e4c5a584ec84492a8a5284812f151d279
SHA256286196e3702b356962a66d970704a1c132568bde7827a617cdcb569be65ab64e
SHA512adb9417705a7eb925ecacd56a0ef6cc196e31a5323a33dd831dc681c98204df3d6deaae9de467ead591e5ae5dfb1d136c7d4838699cd784bb8e4da0e1c41bf8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XIQH11PJ\search[9].htmFilesize
127KB
MD52c96d7669637fc44049f6401ba5fba5d
SHA1308f2fc95a372f99e772a0077ae6f136858c0f12
SHA256007d02b9409c2ff12dde987514b6706e1cdb7924020d4ceb51118beff8d51d23
SHA51204ad65e08e169c27e0fcedf27370b2c4d2daea16639f48199d52e8b701119bb9dec5804cf3dca31d2f72b282dcfbce7c42c88491be18f6b6c2b7698a9b45330a
-
C:\Users\Admin\AppData\Local\Temp\tmpFA1F.tmpFilesize
40KB
MD5c83086b89836df99b6bb13e955cb4934
SHA1583da8ddaaa9af341ad2294e40eaf5fc6c6ddd7e
SHA256b33f902e4e44a186b57b98e6d8aa99301fdafd029c5f20a2fd1f840deeacce5b
SHA512b9e22c760909878dd82affa4ccaa404f39aef8764cb710d92608dceaf8693a912106133cb6e679ccb6bdbae04f7407216c1ab8b21c9502d9d045e2cadbc8f886
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD5b7679ea4423f41d35fad204c01807765
SHA1d494810a553eb3423ec598e2e2ccb3976a60a0c3
SHA2565c105cd37fe34de33cb1d8870b8bbabfe666945bbac557e94cb7eac7ad2932db
SHA512211d30b8c4c74bad9bf67c3914e02223cb0ae10714aab1410630ee7497dcf3dd701a1ea9d334f2f4361afba3a01d0ed7629e36167bb06aa05ee3819dcfa5a553
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD59a4cf575be829efaa5e076e8f92bb045
SHA1011753507a5a3f312438d02755af38dc3bce66e3
SHA25649e6b41e990b67a66f79ea94aaf9a8024902231fbd14dbe3d6fff4ce430cfcb5
SHA512781489b65354e95ef81f727baad7018fc35275a564790f23b650b6314cfbd8aacb971e6d4dc07ee560a9e1478b213aaa1da5e7db0ee2bf71c4dd913f5e000eba
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD5d9c6c7fc8846e1af078d28603da27097
SHA18f5871770f4de7421dbdd1547a64c75acf43dc43
SHA25692193ae6358d1132dfe72ebe7d8fcfb8156b22b3d912f857c52c98252fe3e5ff
SHA51244dbd8d63eb7dca22b6c177b746c738bf3d817e259c49c9e5538c3b2c6f85a24fdb0c66ed54fc15b78c6b6fecc894a898c7d7f4033262dce3dce01667bc345c8
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD568b3b79a7a099b964ab8af1ef64508fe
SHA15c9b5313879bb82f3d1d49e14988975b1c9742b5
SHA256aa22ba9af48fd5afe8e76a54831b4e99b78d9afeea093be1188ce2b299dda27f
SHA5124e3b0106c5c2069e8300f0876df1f9d9476e9392e61dd8536df0a4326a4476d77bfecdcb9466c17a758efdfdd021215270e514403428747353f4b7f2853f9cfb
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD553d466e6ca70dda820fd620b62445cc2
SHA1c4ce6f0daa6cf8e2f8aeb253fb1d78e00a9afa86
SHA256845e31e2fd817535f42ace98e382cbf55ccc0f870e3033fbb104e2ad1fd660c3
SHA512b7812d90da54701b5102250ce35d06afd6531229f3dde57a36894e22642dbca60827b1b2fec93c579333a849d73535472c9e773b517cf0778313f8806834898f
-
C:\Users\Admin\AppData\Local\Temp\zincite.logFilesize
1KB
MD508997ce89b684222b4d59e6b575d41c2
SHA11b1ef305592b1fec30075f0dd975ebe096e32e8f
SHA2569d380721b71c6341c252e0a81dae6314d664f8dba240c091192bc069fe96dce0
SHA5126629e77ec618a16ed179f4fca2d6a2fd6e12fc2e7d59e439623537658ba54735c645e26c93d7bd573c455a9b42f6a00f9f99eb039787eae52019026975b72ee0
-
C:\Users\Admin\AppData\Local\Temp\zincite.logMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Windows\services.exeFilesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
memory/2504-0-0x0000000000500000-0x000000000050D000-memory.dmpFilesize
52KB
-
memory/4300-549-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-455-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-17-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-81-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-552-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-458-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-13-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-462-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-7-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-21-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-22-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-706-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-739-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-412-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4300-751-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB