Analysis
-
max time kernel
125s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 23:09
Behavioral task
behavioral1
Sample
0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe
-
Size
598KB
-
MD5
0fdf328426ecf86ef63b76949fd208fc
-
SHA1
4e1c12e0108a6e82ab112e618cd1cde5eb04cbf2
-
SHA256
0592fd7640b20937bb288c44e06d924daa1e3397f55b54440a7c12e7979d8e48
-
SHA512
4b669582aece23c54c95b3cb5e4f077849e13e4b2aff323a010fa4f0a7aa0d025feadeb76385857a0269c5730877ccc3cdbec529d2fad915efcedea013871f08
-
SSDEEP
6144:twwD6UiF6ojFnFeVZLHrwwDgUiF6ojFnFeVZL8+nOj0FZOUxku0GzTVowvYy:mC44UefsCu4UefFVXTmRy
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
283105420
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" REG.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts server.exe -
Executes dropped EXE 1 IoCs
pid Process 2556 server.exe -
Loads dropped DLL 1 IoCs
pid Process 2784 0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\server.exe = "C:\\Program Files" server.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf server.exe File created C:\autorun.inf server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 2696 REG.exe 2664 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2556 server.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2556 2784 0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe 28 PID 2784 wrote to memory of 2556 2784 0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe 28 PID 2784 wrote to memory of 2556 2784 0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe 28 PID 2784 wrote to memory of 2556 2784 0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe 28 PID 2556 wrote to memory of 2696 2556 server.exe 30 PID 2556 wrote to memory of 2696 2556 server.exe 30 PID 2556 wrote to memory of 2696 2556 server.exe 30 PID 2556 wrote to memory of 2696 2556 server.exe 30 PID 2556 wrote to memory of 2664 2556 server.exe 31 PID 2556 wrote to memory of 2664 2556 server.exe 31 PID 2556 wrote to memory of 2664 2556 server.exe 31 PID 2556 wrote to memory of 2664 2556 server.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0fdf328426ecf86ef63b76949fd208fc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:2696
-
-
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:2664
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5e7d3f8a928cc098e146460f247bc6837
SHA1eb576d3784dcc8e68d5d9de19eb6428b83fd9393
SHA2560243383d0a2bbfd382a170bb6c5c3bf04153070ea66806a1794827ecfc840e7a
SHA512bf2e6a4170e2d8e9b5ae5b68dbe6a24aa6834c0481734abef32212bb7911abc9b43080ef65f88741461b5e03c11305f6dbde71abb7be589ee814d32309e243df
-
Filesize
67KB
MD5e91e6561175af128ebfccd427aee06c6
SHA1c958491b3f75e8d51660d343f81912f1303c0f0c
SHA25647da3007540023290aa55860fba30c1acbb69c1d59f65a360615e96d40d10a08
SHA512894bf22a7237bf3043a54a7aa7fad070860eca89e057e33ac51f6e134ee240d7f22edba9ab5283fe8ae9131b64a7331b0ae7031c215e787db580de26dcd33bdf
-
Filesize
173KB
MD5268bdd9f14e2b1934b7a1125b35e74fe
SHA1aceda13e816b22bc199aeb222936985d7a8ee019
SHA256f62a1a51e02d31e99b7cf2612067e7f16070ef6877cbd5bd1dd18108bb3c9250
SHA5124b2c5b213bba1b169b8de4cf36f733ca4ab4640d7323b0057a5d6b92001e45456d36d773e757ee37d8c9d86040999f461f539790c4f4135cf317a45aa44c6ade