Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe
-
Size
311KB
-
MD5
0994636a8b306f1a1efd26b25a8cfde0
-
SHA1
270f62896af80cea3e330be35d5fa20543294829
-
SHA256
a8cafcc9e607dd2d8ca1c086ee36b8462091fe390cb258938b5ac9acbcadcab4
-
SHA512
32919c1be946acb36fd4e9f251b69910217e5c75d3100d98edb8c7e2dfa45f633772c565e28c6b895431680bc803fe2e7598dd66ca644609912374ba15835887
-
SSDEEP
6144:sd+NsHYcfGkNdCEW/gh95Re3YIAR6y0SROGN+4PrVAuJq:sd+uH3fGoCEW/49zwdGI4PrVAQq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 nLeHpHc01817.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 nLeHpHc01817.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2220-1-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2220-2-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2220-4-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2220-5-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2316-22-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2220-25-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2316-26-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2316-42-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2220-58-0x0000000000400000-0x00000000004B3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\nLeHpHc01817 = "C:\\ProgramData\\nLeHpHc01817\\nLeHpHc01817.exe" nLeHpHc01817.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main nLeHpHc01817.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 2316 nLeHpHc01817.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe Token: SeDebugPrivilege 2316 nLeHpHc01817.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2316 nLeHpHc01817.exe 2316 nLeHpHc01817.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2316 nLeHpHc01817.exe 2316 nLeHpHc01817.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 nLeHpHc01817.exe 2316 nLeHpHc01817.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2316 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2316 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2316 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 28 PID 2220 wrote to memory of 2316 2220 0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\ProgramData\nLeHpHc01817\nLeHpHc01817.exe"C:\ProgramData\nLeHpHc01817\nLeHpHc01817.exe" "C:\Users\Admin\AppData\Local\Temp\0994636a8b306f1a1efd26b25a8cfde0_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311KB
MD56af59bfbece8369b69793775618c7326
SHA1cf747252a4997d8c884e6806114941f9e782166e
SHA25634372203d1b7ed11bb802a5df918a308b60fc705437607601ecdcac715a5e794
SHA512f27d7c64ddbc0ce7f5482bacc049aaa6537b76e133981395d923aa4254786b9c39b725d94629e144368f9b8328bdb78128607092d530986c0b0217bbf1c63a3f