Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 16:31
Static task
static1
Behavioral task
behavioral1
Sample
099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe
-
Size
120KB
-
MD5
099b8474af96f26b8e114c176f7f6b23
-
SHA1
2045d9ca09ca5a7a04af12244b63862a80479a18
-
SHA256
2c0c189df816b6e3887d7b3575b13914b0e219d2cf900b9fdeaea6786f0818e0
-
SHA512
a74c0287cd640ad6ac13f1e8257d17e36eb4835a55546fb79f3deb743ba6e82ef811736cca8db49c0c2c14563374e2f363ad056fecf17bf3d9092e9de4855051
-
SSDEEP
3072:0/uqwf9se/JUkxRWySst8CojxrdQU9ss:0/uxfOCuQROstGxrdV9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\DBS.EXE" 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1824 DBS.EXE -
Loads dropped DLL 2 IoCs
pid Process 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1824 set thread context of 2984 1824 DBS.EXE 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\DBS.EXE 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe File created C:\Program Files\DBS.EXE 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1844 wrote to memory of 1824 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 28 PID 1844 wrote to memory of 1824 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 28 PID 1844 wrote to memory of 1824 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 28 PID 1844 wrote to memory of 1824 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2984 1824 DBS.EXE 29 PID 1824 wrote to memory of 2984 1824 DBS.EXE 29 PID 1824 wrote to memory of 2984 1824 DBS.EXE 29 PID 1824 wrote to memory of 2984 1824 DBS.EXE 29 PID 1824 wrote to memory of 2984 1824 DBS.EXE 29 PID 1824 wrote to memory of 2984 1824 DBS.EXE 29 PID 1844 wrote to memory of 2784 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 30 PID 1844 wrote to memory of 2784 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 30 PID 1844 wrote to memory of 2784 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 30 PID 1844 wrote to memory of 2784 1844 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files\DBS.EXE"C:\Program Files\DBS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\SYSTEM32\userinit.exe3⤵PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5099b8474af96f26b8e114c176f7f6b23
SHA12045d9ca09ca5a7a04af12244b63862a80479a18
SHA2562c0c189df816b6e3887d7b3575b13914b0e219d2cf900b9fdeaea6786f0818e0
SHA512a74c0287cd640ad6ac13f1e8257d17e36eb4835a55546fb79f3deb743ba6e82ef811736cca8db49c0c2c14563374e2f363ad056fecf17bf3d9092e9de4855051