Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 22:38
Behavioral task
behavioral1
Sample
17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe
-
Size
73KB
-
MD5
17ca21ea226f7ad7b315ee607d4f9620
-
SHA1
3323c02573143594587b1f3e853497642026b0ca
-
SHA256
a857973a19d8d4c412ce59aade69bc40fe41dc6a4b07c9b5e8ae004c08ce7d22
-
SHA512
82ff51106ff7589573a1840baf8465b8bd35e8119d736fc6939fb1941f03c9ed35895b4900901234938715c31dbb2accc29b6ca0f4c4e3efef7d0d79193f7835
-
SSDEEP
1536:H/a7Z4sx7EwYbUXKAgnM6C/v/m52zv/PzTluvKDCCRO:fL2ESgnXXK/XluvKDCR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1228 geurge.exe -
Loads dropped DLL 2 IoCs
pid Process 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2152-0-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0008000000015626-8.dat upx behavioral1/memory/2152-31-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1228-33-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1228-41-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ewrgetuj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\geurge.exe" 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: geurge.exe File opened (read-only) \??\a: geurge.exe File opened (read-only) \??\e: geurge.exe File opened (read-only) \??\k: geurge.exe File opened (read-only) \??\o: geurge.exe File opened (read-only) \??\p: geurge.exe File opened (read-only) \??\r: geurge.exe File opened (read-only) \??\s: geurge.exe File opened (read-only) \??\b: geurge.exe File opened (read-only) \??\l: geurge.exe File opened (read-only) \??\v: geurge.exe File opened (read-only) \??\x: geurge.exe File opened (read-only) \??\z: geurge.exe File opened (read-only) \??\g: geurge.exe File opened (read-only) \??\j: geurge.exe File opened (read-only) \??\m: geurge.exe File opened (read-only) \??\n: geurge.exe File opened (read-only) \??\t: geurge.exe File opened (read-only) \??\w: geurge.exe File opened (read-only) \??\y: geurge.exe File opened (read-only) \??\h: geurge.exe File opened (read-only) \??\i: geurge.exe File opened (read-only) \??\q: geurge.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2544 sc.exe 2700 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main geurge.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 1228 geurge.exe 1228 geurge.exe 1228 geurge.exe 1228 geurge.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1228 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 28 PID 2152 wrote to memory of 1228 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 28 PID 2152 wrote to memory of 1228 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 28 PID 2152 wrote to memory of 1228 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2560 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 29 PID 2152 wrote to memory of 2560 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 29 PID 2152 wrote to memory of 2560 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 29 PID 2152 wrote to memory of 2560 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 29 PID 2152 wrote to memory of 2700 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2700 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2700 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2700 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2576 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2576 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2576 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2576 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2544 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 33 PID 2152 wrote to memory of 2544 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 33 PID 2152 wrote to memory of 2544 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 33 PID 2152 wrote to memory of 2544 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 33 PID 2152 wrote to memory of 2800 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 37 PID 2152 wrote to memory of 2800 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 37 PID 2152 wrote to memory of 2800 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 37 PID 2152 wrote to memory of 2800 2152 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 37 PID 2576 wrote to memory of 2436 2576 net.exe 39 PID 2576 wrote to memory of 2436 2576 net.exe 39 PID 2576 wrote to memory of 2436 2576 net.exe 39 PID 2576 wrote to memory of 2436 2576 net.exe 39 PID 2560 wrote to memory of 2452 2560 net.exe 40 PID 2560 wrote to memory of 2452 2560 net.exe 40 PID 2560 wrote to memory of 2452 2560 net.exe 40 PID 2560 wrote to memory of 2452 2560 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\geurge.exeC:\Users\Admin\AppData\Local\Temp\geurge.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:2452
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)3⤵PID:2436
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\tujserrew.bat""2⤵
- Deletes itself
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5a4628559f345f1beada131d9df0eef03
SHA107d81ee3fca5d7091691c834c7fd969f78f489b9
SHA256df26a907c7e1331b0bbfdafdf608e049540b3ac53e297488fbf8c77074f089f9
SHA512060929163a07ba227c18a489f9c230fb68d6bc8ffe496621599dafa7b64624fd2c20e1728cade35c5013bb1251485371f5ce9168c2ac49a64038f2d6d7420e07
-
Filesize
73KB
MD517ca21ea226f7ad7b315ee607d4f9620
SHA13323c02573143594587b1f3e853497642026b0ca
SHA256a857973a19d8d4c412ce59aade69bc40fe41dc6a4b07c9b5e8ae004c08ce7d22
SHA51282ff51106ff7589573a1840baf8465b8bd35e8119d736fc6939fb1941f03c9ed35895b4900901234938715c31dbb2accc29b6ca0f4c4e3efef7d0d79193f7835