Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe
-
Size
101KB
-
MD5
10301dcf7a8cb3170d64f208f6cd427e
-
SHA1
512cbc674a394aab9e61d59f0759fbcb17605448
-
SHA256
c29b8f76ab9bd6286ae383581654ce763737e95b3f6cbf48de1855702f0b6dc8
-
SHA512
d6c80275115fd1625d7615ef1d3ec7ac9f76cc9f459569b497c3df39653558296f026451b2b5dad328bb2a3fc36f6aa67224cfc73744474514dfe5401529f538
-
SSDEEP
3072:xGu99lfzqIbXWm+w0JpgKs4HwSZX44jgPz:x/cuolgKs4Hw7487
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2168 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe 2116 10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 server.exe 2168 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2168 2116 10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2168 2116 10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2168 2116 10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2168 2116 10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe 28 PID 2168 wrote to memory of 1352 2168 server.exe 21 PID 2168 wrote to memory of 1352 2168 server.exe 21 PID 2168 wrote to memory of 1352 2168 server.exe 21 PID 2168 wrote to memory of 1352 2168 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10301dcf7a8cb3170d64f208f6cd427e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5094e2cc0b9e10870239cbf9bbc9c2e4a
SHA1bfe820340a866c1271dacc25eea6d72677dfe302
SHA2568593c1e76b4fe76095dda57b9c3c403aa8833a538dfc9898eb9e77bfdece8134
SHA5122cb9cfdaf8ef55465ec54f4d36af0431c0927f0d7cfd47a1aa1722d1011a25485f77856bbfc5d92c5c07715c54dab593a62f9d55d80d41939feb5bcc62721b4f