Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe
-
Size
61KB
-
MD5
0f62bd0262468d92e6e09b81b2779ac8
-
SHA1
b54e505344e3447c2cde3cd5ee4abd0aee3d8c66
-
SHA256
8f0c3c7503e686f28d3cfeaaaffcbf1152f0a46c9a5968b694c487d9e8e7c441
-
SHA512
950a537e9a021524a5f38f6598f11f46b437d0b30d70187c0137434f7602a3a6168c4ad5a50fbb60092771d3dc4845f7a074c2494a4055e25249970b8ce1d022
-
SSDEEP
768:piExqgQCzrBjr4+uYpUwVG/vHNLyty5ynFzbjivumZurBweqSXH/S+WkDlUL3428:QExqgQRVxyc5QyR4mL+dDlaI2kSUzt
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2752 6193.exe 116 9599.exe 608 Svchosts.exe -
resource yara_rule behavioral2/files/0x0008000000023543-7.dat upx behavioral2/memory/116-9-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-14-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/116-19-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-22-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-23-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-24-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-25-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-26-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-27-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-28-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-29-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-30-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-31-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-32-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-33-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-34-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/608-35-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Svchosts.exe = "Svchosts.exe" 9599.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Svchosts.exe = "Svchosts.exe" Svchosts.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\6193.exe 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe File created C:\Windows\9599.exe 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe File created C:\Windows\Svchosts.exe 9599.exe File opened for modification C:\Windows\Svchosts.exe 9599.exe File created C:\Windows\Deleteme.bat 9599.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 116 9599.exe 116 9599.exe 116 9599.exe 116 9599.exe 116 9599.exe 116 9599.exe 116 9599.exe 116 9599.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe 608 Svchosts.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2752 4824 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe 88 PID 4824 wrote to memory of 2752 4824 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe 88 PID 4824 wrote to memory of 2752 4824 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe 88 PID 4824 wrote to memory of 116 4824 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe 89 PID 4824 wrote to memory of 116 4824 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe 89 PID 4824 wrote to memory of 116 4824 0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe 89 PID 116 wrote to memory of 608 116 9599.exe 90 PID 116 wrote to memory of 608 116 9599.exe 90 PID 116 wrote to memory of 608 116 9599.exe 90 PID 116 wrote to memory of 1556 116 9599.exe 91 PID 116 wrote to memory of 1556 116 9599.exe 91 PID 116 wrote to memory of 1556 116 9599.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f62bd0262468d92e6e09b81b2779ac8_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\6193.exeC:\Windows\6193.exe2⤵
- Executes dropped EXE
PID:2752
-
-
C:\Windows\9599.exeC:\Windows\9599.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\Svchosts.exeC:\Windows\Svchosts.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Deleteme.bat3⤵PID:1556
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4168,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3824 /prefetch:81⤵PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD56285aa4f0b159d742ec10a07c06e6862
SHA1dfb31a831a7a72524d0c94952be06792a03bb257
SHA256c442dc95d0b86cd8db35acfd645b6836818419295464414077491b9adb889cc5
SHA51251a6dbc2681147672f5c3c1f63c1511ac90dc9e803dfc7597ebeddacbab063500dd440a4672f28d96c58d3778d48dbae2f18b226197aabaa771e581a2661c093
-
Filesize
42KB
MD5f447a4170493503509ded00c74b17337
SHA1acaba6230efe7464480ffb5c99f73a3280405a69
SHA25606a62de03fa0c771b7420336efd0abd7e479c8c63a0e99dfe5ea20d5e0357c6a
SHA5120f354045ddb23ab6684658b37a2d9b94c7ed60fcf225338fc2b8bf89e591dde08dd1a5ca2bfac75181e7e57969ccc9526fb61a00bd52fb4ea0788c17912f0706
-
Filesize
82B
MD574367ec0d7217a50780f447e16e83da3
SHA16d90b0dce15f5fe766c7c14c3c475c226092eb81
SHA2568002e17db8b537f0db31dd7347f51d751d93284931b8317159cce394942b270d
SHA512d4978016dd5d3d22f9604ba5d0abdf9a4a26a6f083784c33de2fb6af4f1fcc63b926ccd680c30ac696d1aa898d8021d97178b93055d00e1d79f553e8818ebec9