Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
0017eba174f669022e9217632567fb8f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0017eba174f669022e9217632567fb8f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0017eba174f669022e9217632567fb8f_JaffaCakes118.exe
-
Size
882KB
-
MD5
0017eba174f669022e9217632567fb8f
-
SHA1
b9c282866e4b8ba25b7d02c9777c1fadd675918a
-
SHA256
f78f254a34835a40689fd97c57a46e08280feaa27882cf6cfd8d714d885a2af6
-
SHA512
ddc35cf9db81f91193b51a91386889aedaee09c53466d8443ff6cd825f8ed9c55b90942a82dae5c3ad06972cdc9bc8343c1dbc6754cf83c0e716d2dee2c1a8e8
-
SSDEEP
12288:Z/3dB1Q0DmfK3J4scHdJkQL+ocn1Uqs6m:XZii54saTnors6m
Malware Config
Signatures
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2752-62-0x0000000000400000-0x0000000000419000-memory.dmp MailPassView behavioral1/memory/2752-67-0x0000000000400000-0x0000000000419000-memory.dmp MailPassView -
Nirsoft 5 IoCs
resource yara_rule behavioral1/memory/1792-35-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1792-40-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1792-41-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2752-62-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/2752-67-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft -
Executes dropped EXE 5 IoCs
pid Process 2500 fuckde.exe 1792 fuckde.exe 2752 fuckde.exe 2472 fuckde.exe 2116 fuckde.exe -
resource yara_rule behavioral1/memory/2500-129-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts fuckde.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2500 set thread context of 1792 2500 fuckde.exe 29 PID 2500 set thread context of 2752 2500 fuckde.exe 30 PID 2500 set thread context of 2472 2500 fuckde.exe 31 PID 2500 set thread context of 2116 2500 fuckde.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 1740 2500 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2500 fuckde.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1792 fuckde.exe Token: SeDebugPrivilege 2116 fuckde.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 288 0017eba174f669022e9217632567fb8f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 288 wrote to memory of 2500 288 0017eba174f669022e9217632567fb8f_JaffaCakes118.exe 28 PID 288 wrote to memory of 2500 288 0017eba174f669022e9217632567fb8f_JaffaCakes118.exe 28 PID 288 wrote to memory of 2500 288 0017eba174f669022e9217632567fb8f_JaffaCakes118.exe 28 PID 288 wrote to memory of 2500 288 0017eba174f669022e9217632567fb8f_JaffaCakes118.exe 28 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 1792 2500 fuckde.exe 29 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2752 2500 fuckde.exe 30 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2472 2500 fuckde.exe 31 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 2116 2500 fuckde.exe 32 PID 2500 wrote to memory of 1740 2500 fuckde.exe 33 PID 2500 wrote to memory of 1740 2500 fuckde.exe 33 PID 2500 wrote to memory of 1740 2500 fuckde.exe 33 PID 2500 wrote to memory of 1740 2500 fuckde.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0017eba174f669022e9217632567fb8f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0017eba174f669022e9217632567fb8f_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:288 -
C:\fuckde.exe\fuckde.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\fuckde.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\fuckde.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
PID:2752
-
-
C:\fuckde.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵
- Executes dropped EXE
PID:2472
-
-
C:\fuckde.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 2763⤵
- Program crash
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD50f4295718e404bd3ac534a92d7e6b43c
SHA1c6cf8d71ba62d2f5e8f2f5c9318b9f7a4cec83b0
SHA256188a9f1f8e1cb2ea4c2753605e90f36cb1f5356c5a3baa89a8ce9b09dcd0ad76
SHA5123da24b82e5f7009f501e2585bc57e8ee3fc10049bcdac3a9a69d46eb44f447521bc4ed2a9eebd1b80fc0652765fbc61be930e8243dd3ad3e5cb855d2f8415159