Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe
-
Size
464KB
-
MD5
09e130f6f7840f0b9b38a6d93cd969de
-
SHA1
3159890fb96c60c71ed5365de009226d089c97aa
-
SHA256
270bd28a5b05a13315a8307378c3b5c33ed1b1e3cd87716a2d2a6bd597f59d23
-
SHA512
d0a66bdcd091c81a5ab9656e0adb85a2aa5e20a9e87d9c5de31f42d79dbd0971ae2dcbf2acf490bb8610fc67d57fd9c65695dc74ce72d2fe5d1a28e472065d9f
-
SSDEEP
12288:rZ7ElP0pGufmL5MZZWyan1sVsz/YM5m+J6t5tzD:FEloLmLOLWtn1r5hEtDf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2884 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 ribag.exe -
Loads dropped DLL 3 IoCs
pid Process 2884 cmd.exe 2884 cmd.exe 2708 ribag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2564 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2652 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2564 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe 2708 ribag.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3040 09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe 2708 ribag.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2884 3040 09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe 28 PID 3040 wrote to memory of 2884 3040 09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe 28 PID 3040 wrote to memory of 2884 3040 09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe 28 PID 3040 wrote to memory of 2884 3040 09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe 28 PID 2884 wrote to memory of 2564 2884 cmd.exe 30 PID 2884 wrote to memory of 2564 2884 cmd.exe 30 PID 2884 wrote to memory of 2564 2884 cmd.exe 30 PID 2884 wrote to memory of 2564 2884 cmd.exe 30 PID 2884 wrote to memory of 2652 2884 cmd.exe 32 PID 2884 wrote to memory of 2652 2884 cmd.exe 32 PID 2884 wrote to memory of 2652 2884 cmd.exe 32 PID 2884 wrote to memory of 2652 2884 cmd.exe 32 PID 2884 wrote to memory of 2708 2884 cmd.exe 33 PID 2884 wrote to memory of 2708 2884 cmd.exe 33 PID 2884 wrote to memory of 2708 2884 cmd.exe 33 PID 2884 wrote to memory of 2708 2884 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 3040 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\09e130f6f7840f0b9b38a6d93cd969de_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\ribag.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 30403⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2652
-
-
C:\Users\Admin\AppData\Local\ribag.exeC:\Users\Admin\AppData\Local\ribag.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD509e130f6f7840f0b9b38a6d93cd969de
SHA13159890fb96c60c71ed5365de009226d089c97aa
SHA256270bd28a5b05a13315a8307378c3b5c33ed1b1e3cd87716a2d2a6bd597f59d23
SHA512d0a66bdcd091c81a5ab9656e0adb85a2aa5e20a9e87d9c5de31f42d79dbd0971ae2dcbf2acf490bb8610fc67d57fd9c65695dc74ce72d2fe5d1a28e472065d9f