Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe
-
Size
170KB
-
MD5
0e2f6a22fb2c1ee834e3bb94a17fd98e
-
SHA1
17963e95dc4076646a867ced2923b83b3f4d9391
-
SHA256
e0e9b2c08708db4d612eab542b25d89fa9c96737278650b25799c72b394754af
-
SHA512
442326bf359037f1433fb391eefdfc048ab46ed3f19109cd8d5318b0e9d43f09bed055cbf28704b92cce7c76b721b62f6bc50546ed3577235428ba8de68e26a3
-
SSDEEP
3072:+yyL6e5KJOUM8GXLimIm+lLUntmwRYHPesOZUI5upr6rxE:+rWe8oiGUir5tm
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2536 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ebnc.exeebnc.exepid process 2684 ebnc.exe 2296 ebnc.exe -
Loads dropped DLL 3 IoCs
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exeebnc.exepid process 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 2684 ebnc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\ebnc.exe\" /r" 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exeebnc.exeebnc.exedescription pid process target process PID 2244 set thread context of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2684 set thread context of 2296 2684 ebnc.exe ebnc.exe PID 2296 set thread context of 2604 2296 ebnc.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exeebnc.exeebnc.exedescription pid process target process PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 2244 wrote to memory of 1520 2244 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe PID 1520 wrote to memory of 2684 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe ebnc.exe PID 1520 wrote to memory of 2684 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe ebnc.exe PID 1520 wrote to memory of 2684 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe ebnc.exe PID 1520 wrote to memory of 2684 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2684 wrote to memory of 2296 2684 ebnc.exe ebnc.exe PID 2296 wrote to memory of 2604 2296 ebnc.exe svchost.exe PID 2296 wrote to memory of 2604 2296 ebnc.exe svchost.exe PID 2296 wrote to memory of 2604 2296 ebnc.exe svchost.exe PID 2296 wrote to memory of 2604 2296 ebnc.exe svchost.exe PID 2296 wrote to memory of 2604 2296 ebnc.exe svchost.exe PID 2296 wrote to memory of 2604 2296 ebnc.exe svchost.exe PID 1520 wrote to memory of 2536 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe cmd.exe PID 1520 wrote to memory of 2536 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe cmd.exe PID 1520 wrote to memory of 2536 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe cmd.exe PID 1520 wrote to memory of 2536 1520 0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e2f6a22fb2c1ee834e3bb94a17fd98e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\ebnc.exe"C:\Users\Admin\ebnc.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\ebnc.exe"C:\Users\Admin\ebnc.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2604
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6421.bat" "3⤵
- Deletes itself
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD50f1b739d6ddd0c30b87289281bf22b9f
SHA1263b16cafcf98e33fd6b280398a98a274162bf2f
SHA256c0dfc6e415eb41d361a9a3f3406b8739486af27558de225f9b7ff121ae21b0bb
SHA51223d168dc8a712030cbf08226198dd1952b20342835f0cb4f9f214613efb01d70185facf17aeeca40fecc7c289459fac50dd0a9fdb63b9512ba13101d8d6fe850
-
Filesize
170KB
MD50e2f6a22fb2c1ee834e3bb94a17fd98e
SHA117963e95dc4076646a867ced2923b83b3f4d9391
SHA256e0e9b2c08708db4d612eab542b25d89fa9c96737278650b25799c72b394754af
SHA512442326bf359037f1433fb391eefdfc048ab46ed3f19109cd8d5318b0e9d43f09bed055cbf28704b92cce7c76b721b62f6bc50546ed3577235428ba8de68e26a3