Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe
-
Size
15KB
-
MD5
05921a990d6ff9cb94b92752d32916df
-
SHA1
829f98a8d5c69802bc5916576846a5859fadb65f
-
SHA256
a49c61ef1cb7b5dd8029b4cef5a7d9e642293dd07a6462c179706dfbed3fc3a4
-
SHA512
669fd8847346b1be3ac8332cfc18d73e94a03e9af86e6e4d366e812ef01e4501be4cffe43bbf85de94f2712ced2aed21428e7e6dd2f503bdb7e900d34a550cd3
-
SSDEEP
384:Xk+pgrrvYIetuVJng4p3Yhxv088MEOAcydr:XQMwVbponL8MN6r
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63E16148-3A71-99D9-2524-FE3574645AFF} 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63E16148-3A71-99D9-2524-FE3574645AFF}\StubPath = "C:\\Windows\\system32\\ssopure.exe" 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 ssopure.exe -
Loads dropped DLL 2 IoCs
pid Process 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ssopure.exe 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ssopure.exe 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe File created C:\Windows\SysWOW64\ssopure.exe ssopure.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2192 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 28 PID 2132 wrote to memory of 2192 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 28 PID 2132 wrote to memory of 2192 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 28 PID 2132 wrote to memory of 2192 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 28 PID 2192 wrote to memory of 1248 2192 ssopure.exe 29 PID 2192 wrote to memory of 1248 2192 ssopure.exe 29 PID 2192 wrote to memory of 1248 2192 ssopure.exe 29 PID 2192 wrote to memory of 1248 2192 ssopure.exe 29 PID 2132 wrote to memory of 2908 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2908 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2908 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2908 2132 05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\ssopure.exeC:\Windows\system32\ssopure.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\ssopure.exe"3⤵PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\05921a990d6ff9cb94b92752d32916df_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD505921a990d6ff9cb94b92752d32916df
SHA1829f98a8d5c69802bc5916576846a5859fadb65f
SHA256a49c61ef1cb7b5dd8029b4cef5a7d9e642293dd07a6462c179706dfbed3fc3a4
SHA512669fd8847346b1be3ac8332cfc18d73e94a03e9af86e6e4d366e812ef01e4501be4cffe43bbf85de94f2712ced2aed21428e7e6dd2f503bdb7e900d34a550cd3