Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe
-
Size
155KB
-
MD5
0b7c9f69a94b45d3ba41ec21747d5257
-
SHA1
09f42eb50a34500f6cc3cde6a18dce0883707986
-
SHA256
d60db77657efe6a3dd701bf72bc16dfb56306bc1b0d508a549aca0d8f36338c1
-
SHA512
af3eadc5c49b43048ac9195f98001ded443463d337dade79e7ea90ca0623955aa1aed23b0f45e7964b7797cc63bf95aa31025930443ad2d87e8e7e2c891d6aa3
-
SSDEEP
3072:Nnj9jtfU+INndIc0JHmHkCAZfViVUdR2ckgAWTjlohOg6sZQGfPUMAlXzsl:NjbeinU3Cf34ck/WTjCkgvfgB
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2168 Release.exe 1384 Adobe_Update.exe 2708 Java Update.exe -
Loads dropped DLL 5 IoCs
pid Process 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 2168 Release.exe 2168 Release.exe 2168 Release.exe 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Runtime Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\Java Update.exe" Java Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main Java Update.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1384 Adobe_Update.exe 1384 Adobe_Update.exe 2708 Java Update.exe 2708 Java Update.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 616 wrote to memory of 2168 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 28 PID 616 wrote to memory of 2168 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 28 PID 616 wrote to memory of 2168 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 28 PID 616 wrote to memory of 2168 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 28 PID 616 wrote to memory of 2168 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 28 PID 616 wrote to memory of 2168 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 28 PID 616 wrote to memory of 2168 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 28 PID 2168 wrote to memory of 1384 2168 Release.exe 29 PID 2168 wrote to memory of 1384 2168 Release.exe 29 PID 2168 wrote to memory of 1384 2168 Release.exe 29 PID 2168 wrote to memory of 1384 2168 Release.exe 29 PID 616 wrote to memory of 2708 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 30 PID 616 wrote to memory of 2708 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 30 PID 616 wrote to memory of 2708 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 30 PID 616 wrote to memory of 2708 616 0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe 30 PID 1384 wrote to memory of 2492 1384 Adobe_Update.exe 32 PID 1384 wrote to memory of 2492 1384 Adobe_Update.exe 32 PID 1384 wrote to memory of 2492 1384 Adobe_Update.exe 32 PID 2492 wrote to memory of 2664 2492 csc.exe 34 PID 2492 wrote to memory of 2664 2492 csc.exe 34 PID 2492 wrote to memory of 2664 2492 csc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b7c9f69a94b45d3ba41ec21747d5257_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Release.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adobe_Update.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lgqq4qwc.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES23A8.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC23A7.tmp"5⤵PID:2664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Java Update.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5890ead2e9641fb4d552b70f5cba861e1
SHA1a136cf74a7e7bc431084758063ef26fedd2d8346
SHA25660fee88b19f44b00cbc6d3e4e41eefb53621aa838c79ce429d13d73fc02fefc6
SHA512ac4fea6d72d83ffea6cf30ff1996bd2f3ee35ae7d48a780932f426e4c5acc7e931123cdc83c509faf15e298994eaac35dc17ac2f1cf7ccccc7ba142608e9aa73
-
Filesize
7KB
MD50d35116485e8fb0a458d49989e61197b
SHA1970c8a8111815f7d7631d7e3e73609eb2563e128
SHA256f5cc940e3e835faa99285a66f0787546ee33175b01769251467d54db0409de15
SHA512416e761e70db41a640a7ee22995c4ccea8f4a29131b58171ee4aa74d1937e312a5215796a44dc7778fe9371201c29597cebc2c8b556ba60271a57a4868d7d49b
-
Filesize
6KB
MD5056de44ff02c983d6915228cfcd970fc
SHA1b41793853c18f620a95dc19e91739fb77f975615
SHA2569495302ed6e44d73bf4d59d01598e878e97c621cff83042c27b461726c645971
SHA5127b18a8c2cee6979a8fef5324c0dcf254e89a3883a05dcec3eba10f589b87d1f5086e7427b2d96e4ba60bf97f313a0d8250ae1d27d9e1fe1e8b62fed74937ff9c
-
Filesize
43KB
MD5fb2f21dd9cf648dc34f8e8f3f3a71b4f
SHA174ae0d969bf3eae2812cac75406e194818c6af8e
SHA25667b0fe6149bdafc95ec8eb1f74d96f29d49f4a90f8f2df19ad60da69e8e3b8af
SHA512a61b41967976b319096aa5220b317ff2c2d9bd20e759b793c22453925b68435bb2ee793032b5c32813ac102165ef5cbb39e142d27fb340f1c3b0e9a5d4299a67
-
Filesize
1KB
MD5bfbcc8a5c0fe004adb350d47a45b257d
SHA1fe86febf429f7dc2a5f47dfe54a08a232ab2d783
SHA256906cd4e0e2052f7f012c58f24c8c768fd7738fb57dbde617fffb9c944f0d9ede
SHA512299268a216945615c1f2550a91fa937ee7d882ef808f9c3a74f747bee9b2ec836e7d3b26f3a8a55611d452497b9abaaad9a93dedc9f601957f62ee36f06bfd07
-
Filesize
32KB
MD59a956d6e6df78f272893fd939e38bb65
SHA1c7e7e620f427c66121c7de3235c6e9d6bc0a735c
SHA25645bc7b4a8544897187b97f888282393ef7de84eed010192f5696ab727cf48bfd
SHA512aa6c0b740461eb289e53eb9d93d2157ea26efa8dcd5b2b8bbca1559958746ed09c3efd7542a6f99e1296462317e9d9a126d08e1634fef92ef2b8c47292517408
-
Filesize
652B
MD5ce6f3a28e20d68f99e9d6f4a5e7390fb
SHA1dcc62ae48c070e55bc69bd2317d24769ea937c5e
SHA256ecc5fa2761a33ee76fd6afd3f69c3df07030ab4d8b2f47a219ec8915fb9f6e81
SHA5128616a56b890f6f9a2cdc27118f54d82786c8d42b7c6c1e311922bf43ce45003e009fa1e7a12f3253c33c0ea99524e8e1fc66e597bca60c45a0ef0ad6bfcb032f
-
Filesize
39KB
MD523a76cc9317bc2d7757e89d7197a893e
SHA10372ee4a8404bdb8ba6cba344448b0754b98c2ce
SHA256db6c8cfa63aa4d909eb60e8ed30235b56508e3bfab2cfa3e93ddd62c94179022
SHA51268fac7a9ecb8acd44107d0b2ecc0077b7f5185ac5a2ccd0e3e319b4dce36b9b9a53b33b1b8ded02427b4cbee5c28ebaa969849122ca13f41a77f72478282bb41
-
Filesize
598B
MD5667a51680fa7d43bd56e44c439abaeaf
SHA1357c70f518c8ccb5d00ef90e33983fc1f249b4a2
SHA2562900d399384027ea8be13d435e6f8a44e0184a31d9b612bd4ea02abe32e60203
SHA51240a26da34f1b222939019034a76295db03ea2c612486b20964795ba5dbc3837ebeb45d432b36928a86e33d80f1f1c862908c0ab6ef034e015e5865871ca5ec8a
-
Filesize
53KB
MD5e80f959c5fa918eeb106b87ac88f3b1b
SHA1b31cb37cdd9ea70af01437e3ed4398fef421a232
SHA2568e2e1357b6dc472c1beaa9358cbfa21be653b3d171e9b4bf086c15dcca9c3df8
SHA512061236fae2212451ed45cf6019d51145bbb2259167f0d3e5a1560e1224d0020c5e4561c3482ff6df3d6c9c9ce9f793c1d60a97b40da4702bf44414fd45e268d6
-
Filesize
20KB
MD5e3761cbb4338919e74a783ccba9df608
SHA1c834f300e52b3623fc21196baa9c066594f0eb5a
SHA2568151fc1655de34870408efc61ae0794f0fc0263f82649d2de78c527da249d87f
SHA512850bdb16b42dad3259c6213ceb0fa888c023209429c254deb138a563b50d2adbe3b0b7ead9a9d48cc89c93a9ee1c9a46dab9255bde4796293611d214763b1001
-
Filesize
149KB
MD5eaa7bc60632fe839d29d9264b76ec2e9
SHA19817f6f99631d76836ce56b253dacc1ecfb2d049
SHA25663a28d42281c22c3ef912805a4d2f398752e065729fcc4e57a283378d7b832dc
SHA5124eb39c2ab73cb86ac21e5c782f1ce874f245d127caf42abcb5e0a312e8794c168fe1ef24bd1af7ff3a39a88f6052c8a1f9bbd76b247d228eda4b8636e4d506ed