Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 12:33
Behavioral task
behavioral1
Sample
06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe
-
Size
41KB
-
MD5
06054faad1c40babebac20fb1d3030df
-
SHA1
a9205e8bb5e3d75b2367d7b8ec2ece515436f60f
-
SHA256
b03a1fa3040d87a5a60973012bb4b5749de7d5f9a942db5cbc8d3ae14dbcdcf6
-
SHA512
d0b380445fec0c43a315f2c70023d183c1f7b33c437acaafea974a52caf1f838aab486676b287aad83b626eb50c100a7fb5cd40e1f176d0bbed4bb8e474b4c61
-
SSDEEP
768:GaXP161LpPQYXOw7qsFEG1QhouuczbkMmlPH/euRJIRyb9X0twHGmj0IlO:pd61LpPVMsFE0IouDbzS//H/5fbvO
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe 06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3032-0-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/files/0x000e000000012286-5.dat upx behavioral1/memory/3032-6-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/3032-10-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 06054faad1c40babebac20fb1d3030df_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD597603167dd30b52d4e214429772d9dab
SHA1bc800487dc8eb719c2ba027e400dd5b604d840cd
SHA2566f53e117384a8cd9c0caf65df58c61d2fda63e85e3845bad68534e2e892e0a39
SHA512c96545feb609ea200a005ad838c12cbb814588603a0bc6e1e8fc7479ea55e7405612fd4c6ce06b96908e9f79a8245a2c397c5ca3ab52ffab974169b237b69185