Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
0e60642f21f5e25d644a032eb085b9f6
-
SHA1
a1e41e9576a20dd5f29f5ad1b6a246b287e9063c
-
SHA256
ec959d30cbd501b5e81246cc8b3e9ad171e4cf7b629a40fdae8acbd09a292bff
-
SHA512
d534b6f2bbccfbbfc2640589595afcf27b8f01e87f23edffa6df74f42ae16585e554c8a24e1765d8a4e4f82381738d698f8d2d44badfd330b71096b3f3b91625
-
SSDEEP
49152:j2XGhfikdOXuiej91aKz0BtFgQn+cM9a3NuZI:jiGNiPuXnzA5ys30Z
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ctfmon.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\ctfmon.exe \"" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 3044 setup.exe 2756 chaosupgrade.exe 2532 ctfmon.exe -
Loads dropped DLL 19 IoCs
pid Process 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 2756 chaosupgrade.exe 2756 chaosupgrade.exe 2756 chaosupgrade.exe 2532 ctfmon.exe 2532 ctfmon.exe 2532 ctfmon.exe 2532 ctfmon.exe 2532 ctfmon.exe 3044 setup.exe 2756 chaosupgrade.exe 2756 chaosupgrade.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main chaosupgrade.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2500 reg.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe 2532 ctfmon.exe 3044 setup.exe 3044 setup.exe 3044 setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3044 setup.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 ctfmon.exe 2532 ctfmon.exe 2756 chaosupgrade.exe 2756 chaosupgrade.exe 2756 chaosupgrade.exe 2756 chaosupgrade.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3044 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 28 PID 2880 wrote to memory of 3044 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 28 PID 2880 wrote to memory of 3044 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 28 PID 2880 wrote to memory of 3044 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 28 PID 2880 wrote to memory of 3044 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 28 PID 2880 wrote to memory of 3044 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 28 PID 2880 wrote to memory of 3044 2880 0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2756 3044 setup.exe 29 PID 3044 wrote to memory of 2756 3044 setup.exe 29 PID 3044 wrote to memory of 2756 3044 setup.exe 29 PID 3044 wrote to memory of 2756 3044 setup.exe 29 PID 3044 wrote to memory of 2756 3044 setup.exe 29 PID 3044 wrote to memory of 2756 3044 setup.exe 29 PID 3044 wrote to memory of 2756 3044 setup.exe 29 PID 3044 wrote to memory of 2532 3044 setup.exe 30 PID 3044 wrote to memory of 2532 3044 setup.exe 30 PID 3044 wrote to memory of 2532 3044 setup.exe 30 PID 3044 wrote to memory of 2532 3044 setup.exe 30 PID 3044 wrote to memory of 2532 3044 setup.exe 30 PID 3044 wrote to memory of 2532 3044 setup.exe 30 PID 3044 wrote to memory of 2532 3044 setup.exe 30 PID 3044 wrote to memory of 3064 3044 setup.exe 31 PID 3044 wrote to memory of 3064 3044 setup.exe 31 PID 3044 wrote to memory of 3064 3044 setup.exe 31 PID 3044 wrote to memory of 3064 3044 setup.exe 31 PID 3044 wrote to memory of 3064 3044 setup.exe 31 PID 3044 wrote to memory of 3064 3044 setup.exe 31 PID 3044 wrote to memory of 3064 3044 setup.exe 31 PID 3064 wrote to memory of 2428 3064 cmd.exe 33 PID 3064 wrote to memory of 2428 3064 cmd.exe 33 PID 3064 wrote to memory of 2428 3064 cmd.exe 33 PID 3064 wrote to memory of 2428 3064 cmd.exe 33 PID 3064 wrote to memory of 2428 3064 cmd.exe 33 PID 3064 wrote to memory of 2428 3064 cmd.exe 33 PID 3064 wrote to memory of 2428 3064 cmd.exe 33 PID 2428 wrote to memory of 2500 2428 cmd.exe 34 PID 2428 wrote to memory of 2500 2428 cmd.exe 34 PID 2428 wrote to memory of 2500 2428 cmd.exe 34 PID 2428 wrote to memory of 2500 2428 cmd.exe 34 PID 2428 wrote to memory of 2500 2428 cmd.exe 34 PID 2428 wrote to memory of 2500 2428 cmd.exe 34 PID 2428 wrote to memory of 2500 2428 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\Microsoft\setup.exe"C:\Users\Admin\AppData\Roaming\Microsoft\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Roaming\chaosupgrade.exe"C:\Users\Admin\AppData\Roaming\chaosupgrade.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Users\Admin\AppData\Roaming\ctfmon.exe"C:\Users\Admin\AppData\Roaming\ctfmon.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd /c syscheck.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V ctfmon.exe /D "\"C:\Users\Admin\AppData\Roaming\ctfmon.exe \"" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V ctfmon.exe /D "\"C:\Users\Admin\AppData\Roaming\ctfmon.exe \"" /f5⤵
- Adds policy Run key to start application
- Modifies registry key
PID:2500
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD561d21ff42e2378738c7acb939aecf1fa
SHA1006283f8e5d75f493f3ebc1d3d02eb383cb18b9e
SHA2561ad4c1a258c9415f9bcb623a78e77b5e857d1fc1be33f46db030daeae7e58719
SHA5128179ede61d292461e5002986f1ed06508ce5ca23fbfc19dd363cb56da65306c8c57a45c024c3ea1d0c5a0819223be334a4a3b51c9500f2eb8180201358cf9093
-
Filesize
120KB
MD59762cb860159a9838b065a03cb5d60a3
SHA1355639e16156bea80c86f6dd4e9facf2607cce06
SHA2562cd47869927ba0f0c214727bca2ed98814b37959b60b7dc0103c54a7e6e68fad
SHA512f5f17866c6fd5ff476d4e013dfaa762b278838706e218142505e8c671ec1742cc9f67729235d5029ce86f329b54b7caaff0bd0218ff354604908ea9f26c40341
-
Filesize
237KB
MD5f0832f8fa95fbf622e21da79f12a3739
SHA1b4967afbd5e66e3c19c10549f2358d9770a78764
SHA256fa123e6f6e8611e6630afeedcbbafd153326d11cf341044d8c5a81e6f5875305
SHA512cd774e349979b03732ae0e22fc0409099bdad41d79292ae673cf78d7a877d1c40fee7698051180e50163d0c2108b4ccf295fc2ed126ae5f0772d56acf8638b55
-
Filesize
1.1MB
MD5146d21bc5a15ce02b9b95be81c219431
SHA115a7d389e56fec684def71fc0915337d368c8cf6
SHA256d375580e1d06bc00ed24f2c765e9fe2e75770657c5c0578b3911d5285d2a1fc4
SHA512902a38371cbd506e5c9c2d79065b143287b200c5ed755ffbea6a528bb87d7574394ca5a3e1141d3b24d2144f0f327f381e568dfb7df0f0d589641329614f285d
-
Filesize
285KB
MD5fe2232f82e4beb5ae483da8e699e1a51
SHA1ed2131d0f70e709f8791bfff64d2b8a4cb658ed5
SHA2560cb462094392aeb31dd7588d95de2577efd0987315be0ce84a531c26bee3b49e
SHA512df9ab5afb94cff850dd5c4b4ba0cfcd77d4a5887ac85a60db223eba8c5d1d64467d77c6133b8e1f5ca795deae3623717ff4cc669919d9f96ef6df193187fcc0b
-
Filesize
148KB
MD5921f473593f90a40253b31bd5d6c876e
SHA13ad2fb71ff8ccde1e68e908b55b11227619e3fa5
SHA256223c12f4c8c6c1c7c75b3a542e173aed16bd171c4f98903c584dc93dfd025602
SHA512f7b147c1313a1f6b6108a9feebdb4b32dffadadd3c9a60a22914d437e1378b95f1d7f468b6b3b95d7e95eebd500b8bb6c64a410e4d6d0d8f9e6f761592c29c86