Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe
-
Size
120KB
-
MD5
099b8474af96f26b8e114c176f7f6b23
-
SHA1
2045d9ca09ca5a7a04af12244b63862a80479a18
-
SHA256
2c0c189df816b6e3887d7b3575b13914b0e219d2cf900b9fdeaea6786f0818e0
-
SHA512
a74c0287cd640ad6ac13f1e8257d17e36eb4835a55546fb79f3deb743ba6e82ef811736cca8db49c0c2c14563374e2f363ad056fecf17bf3d9092e9de4855051
-
SSDEEP
3072:0/uqwf9se/JUkxRWySst8CojxrdQU9ss:0/uxfOCuQROstGxrdV9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A} 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21E9C5D3-EBFF-11CD-B6FD-00AA00B4E22A}\StubPath = "C:\\Program Files\\DBS.EXE" 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1216 DBS.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1216 set thread context of 1592 1216 DBS.EXE 82 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\DBS.EXE 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe File created C:\Program Files\DBS.EXE 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4868 wrote to memory of 1216 4868 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 81 PID 4868 wrote to memory of 1216 4868 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 81 PID 4868 wrote to memory of 1216 4868 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 81 PID 1216 wrote to memory of 1592 1216 DBS.EXE 82 PID 1216 wrote to memory of 1592 1216 DBS.EXE 82 PID 1216 wrote to memory of 1592 1216 DBS.EXE 82 PID 1216 wrote to memory of 1592 1216 DBS.EXE 82 PID 1216 wrote to memory of 1592 1216 DBS.EXE 82 PID 4868 wrote to memory of 4836 4868 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 83 PID 4868 wrote to memory of 4836 4868 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 83 PID 4868 wrote to memory of 4836 4868 099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\DBS.EXE"C:\Program Files\DBS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\userinit.exeC:\Windows\SYSTEM32\userinit.exe3⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\099b8474af96f26b8e114c176f7f6b23_JaffaCakes118.exe"2⤵PID:4836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5099b8474af96f26b8e114c176f7f6b23
SHA12045d9ca09ca5a7a04af12244b63862a80479a18
SHA2562c0c189df816b6e3887d7b3575b13914b0e219d2cf900b9fdeaea6786f0818e0
SHA512a74c0287cd640ad6ac13f1e8257d17e36eb4835a55546fb79f3deb743ba6e82ef811736cca8db49c0c2c14563374e2f363ad056fecf17bf3d9092e9de4855051