Analysis
-
max time kernel
141s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe
-
Size
300KB
-
MD5
b84cb1bf75e472973bed157bab410f04
-
SHA1
fe4d97e9fd68677ae1e1b459885b3979eabba445
-
SHA256
69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a
-
SHA512
266128f62ef53d596196bed76ef94c9aef135f248a2c0a9b44a909bdff4613a048875d9a8debf7082e50eea29acb32891fd7edc535d085558a9250a5f402c9a8
-
SSDEEP
6144:IXTq8tcMqCZuCkGZGXOGrmtiwJpIS3tJ0dNaVcW+VoImI8EDQGXI/:38cMq8uepPrSNamDT98EdI
Malware Config
Extracted
buer
https://officewestunionbank.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\e6f211810a8b22d27266\\AutoReg.exe\"" AutoReg.exe -
resource yara_rule behavioral2/memory/2840-1-0x0000000000490000-0x0000000000590000-memory.dmp buer behavioral2/memory/2840-2-0x0000000000400000-0x000000000045C000-memory.dmp buer behavioral2/memory/2840-7-0x0000000040000000-0x000000004005D000-memory.dmp buer behavioral2/memory/3616-9-0x0000000040000000-0x0000000040BA8000-memory.dmp buer behavioral2/memory/2840-11-0x0000000000400000-0x000000000045C000-memory.dmp buer behavioral2/memory/3616-12-0x0000000040000000-0x0000000040BA8000-memory.dmp buer behavioral2/memory/2840-10-0x0000000040000000-0x0000000040BA8000-memory.dmp buer behavioral2/memory/3616-13-0x0000000040000000-0x0000000040BA8000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 3616 AutoReg.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: AutoReg.exe File opened (read-only) \??\T: AutoReg.exe File opened (read-only) \??\B: AutoReg.exe File opened (read-only) \??\H: AutoReg.exe File opened (read-only) \??\L: AutoReg.exe File opened (read-only) \??\O: AutoReg.exe File opened (read-only) \??\P: AutoReg.exe File opened (read-only) \??\V: AutoReg.exe File opened (read-only) \??\I: AutoReg.exe File opened (read-only) \??\M: AutoReg.exe File opened (read-only) \??\Q: AutoReg.exe File opened (read-only) \??\R: AutoReg.exe File opened (read-only) \??\U: AutoReg.exe File opened (read-only) \??\X: AutoReg.exe File opened (read-only) \??\Y: AutoReg.exe File opened (read-only) \??\A: AutoReg.exe File opened (read-only) \??\J: AutoReg.exe File opened (read-only) \??\K: AutoReg.exe File opened (read-only) \??\N: AutoReg.exe File opened (read-only) \??\W: AutoReg.exe File opened (read-only) \??\E: AutoReg.exe File opened (read-only) \??\G: AutoReg.exe File opened (read-only) \??\Z: AutoReg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3664 2840 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3616 2840 b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe 85 PID 2840 wrote to memory of 3616 2840 b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe 85 PID 2840 wrote to memory of 3616 2840 b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\ProgramData\e6f211810a8b22d27266\AutoReg.exeC:\ProgramData\e6f211810a8b22d27266\AutoReg.exe "C:\Users\Admin\AppData\Local\Temp\b84cb1bf75e472973bed157bab410f04_JaffaCakes118.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Enumerates connected drives
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 4722⤵
- Program crash
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2840 -ip 28401⤵PID:724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5b84cb1bf75e472973bed157bab410f04
SHA1fe4d97e9fd68677ae1e1b459885b3979eabba445
SHA25669377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a
SHA512266128f62ef53d596196bed76ef94c9aef135f248a2c0a9b44a909bdff4613a048875d9a8debf7082e50eea29acb32891fd7edc535d085558a9250a5f402c9a8