Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
08448646852848257ba5f8a18100cf55_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08448646852848257ba5f8a18100cf55_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
08448646852848257ba5f8a18100cf55_JaffaCakes118.exe
-
Size
19KB
-
MD5
08448646852848257ba5f8a18100cf55
-
SHA1
feb14a6fd71330cfe4f39df76d333e73d1a67bbd
-
SHA256
06ee807a4476bf575ad67c992ba17f1d23a4de069b377a5be7525a41edcff13b
-
SHA512
e285e223af3274d7db96ba9f472e46828942c12e67e664ed1cfb5a1d373af7d70ee51139d4fd77634f82cdaf282344003bf6facb2fe1705344ed0c251db0132a
-
SSDEEP
384:muuWSFaWryMUXGOudXPtrLoAzNIoXKmO0SoPF1JEXwtXRoaU4b4J9EeBvGFzoL7A:LYPyheXPtrLJNdK6TkXw0yEJ9Kz2s4yX
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\18ADD58\ImagePath = "C:\\Windows\\system32\\18ADD58.EXE -service" 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 18ADD58.EXE -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\18ADD58.EXE 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\18ADD58.EXE 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe File created C:\Windows\SysWOW64\18ADD58T.EXE 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe File created C:\Windows\SysWOW64\18ADD58.EXE 18ADD58.EXE File opened for modification C:\Windows\SysWOW64\18ADD58T.EXE 18ADD58.EXE File created C:\Windows\SysWOW64\18ADD58.DLL 18ADD58.EXE File created C:\Windows\SysWOW64\delme.bat 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2764 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe 1856 18ADD58.EXE 1856 18ADD58.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2644 2764 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe 29 PID 2764 wrote to memory of 2644 2764 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe 29 PID 2764 wrote to memory of 2644 2764 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe 29 PID 2764 wrote to memory of 2644 2764 08448646852848257ba5f8a18100cf55_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\08448646852848257ba5f8a18100cf55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08448646852848257ba5f8a18100cf55_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
PID:2644
-
-
C:\Windows\SysWOW64\18ADD58.EXEC:\Windows\SysWOW64\18ADD58.EXE -service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD508448646852848257ba5f8a18100cf55
SHA1feb14a6fd71330cfe4f39df76d333e73d1a67bbd
SHA25606ee807a4476bf575ad67c992ba17f1d23a4de069b377a5be7525a41edcff13b
SHA512e285e223af3274d7db96ba9f472e46828942c12e67e664ed1cfb5a1d373af7d70ee51139d4fd77634f82cdaf282344003bf6facb2fe1705344ed0c251db0132a
-
Filesize
239B
MD5322c006fa140d2c04b20322ccb39be91
SHA1ccd263dc15a6f839605f756b17c205bf441a924b
SHA2566cd5e65f2fe97ee4bc58f2c20487852377bc71316f8b722510c94b24e79cc3f9
SHA512d6cc48870f99c4baeed62b97c2bc8129c286a57bffadd77f9cb229fc1fef0c63214a5dee9c4011e16054128c7eb0623753853bc8a30ec629b12648fa7e2f1e55