Analysis
-
max time kernel
157s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 22:38
Behavioral task
behavioral1
Sample
17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe
-
Size
73KB
-
MD5
17ca21ea226f7ad7b315ee607d4f9620
-
SHA1
3323c02573143594587b1f3e853497642026b0ca
-
SHA256
a857973a19d8d4c412ce59aade69bc40fe41dc6a4b07c9b5e8ae004c08ce7d22
-
SHA512
82ff51106ff7589573a1840baf8465b8bd35e8119d736fc6939fb1941f03c9ed35895b4900901234938715c31dbb2accc29b6ca0f4c4e3efef7d0d79193f7835
-
SSDEEP
1536:H/a7Z4sx7EwYbUXKAgnM6C/v/m52zv/PzTluvKDCCRO:fL2ESgnXXK/XluvKDCR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 geurge.exe -
resource yara_rule behavioral2/memory/2260-0-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2260-1-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2260-4-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2260-6-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/files/0x0003000000000733-21.dat upx behavioral2/memory/2260-28-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2268-29-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/2260-30-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ewrgetuj = "C:\\Users\\Admin\\AppData\\Local\\Temp\\geurge.exe" 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: geurge.exe File opened (read-only) \??\v: geurge.exe File opened (read-only) \??\x: geurge.exe File opened (read-only) \??\y: geurge.exe File opened (read-only) \??\a: geurge.exe File opened (read-only) \??\g: geurge.exe File opened (read-only) \??\j: geurge.exe File opened (read-only) \??\z: geurge.exe File opened (read-only) \??\b: geurge.exe File opened (read-only) \??\h: geurge.exe File opened (read-only) \??\o: geurge.exe File opened (read-only) \??\p: geurge.exe File opened (read-only) \??\q: geurge.exe File opened (read-only) \??\r: geurge.exe File opened (read-only) \??\t: geurge.exe File opened (read-only) \??\u: geurge.exe File opened (read-only) \??\m: geurge.exe File opened (read-only) \??\n: geurge.exe File opened (read-only) \??\w: geurge.exe File opened (read-only) \??\l: geurge.exe File opened (read-only) \??\s: geurge.exe File opened (read-only) \??\e: geurge.exe File opened (read-only) \??\i: geurge.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 892 sc.exe 2492 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 2268 geurge.exe 2268 geurge.exe 2268 geurge.exe 2268 geurge.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2268 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 100 PID 2260 wrote to memory of 2268 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 100 PID 2260 wrote to memory of 2268 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 100 PID 2260 wrote to memory of 4752 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 101 PID 2260 wrote to memory of 4752 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 101 PID 2260 wrote to memory of 4752 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 101 PID 2260 wrote to memory of 892 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 103 PID 2260 wrote to memory of 892 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 103 PID 2260 wrote to memory of 892 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 103 PID 2260 wrote to memory of 4912 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 104 PID 2260 wrote to memory of 4912 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 104 PID 2260 wrote to memory of 4912 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 104 PID 2260 wrote to memory of 2492 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 105 PID 2260 wrote to memory of 2492 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 105 PID 2260 wrote to memory of 2492 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 105 PID 2260 wrote to memory of 3404 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 109 PID 2260 wrote to memory of 3404 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 109 PID 2260 wrote to memory of 3404 2260 17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe 109 PID 4912 wrote to memory of 2096 4912 net.exe 112 PID 4912 wrote to memory of 2096 4912 net.exe 112 PID 4912 wrote to memory of 2096 4912 net.exe 112 PID 4752 wrote to memory of 4400 4752 net.exe 111 PID 4752 wrote to memory of 4400 4752 net.exe 111 PID 4752 wrote to memory of 4400 4752 net.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17ca21ea226f7ad7b315ee607d4f9620_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\geurge.exeC:\Users\Admin\AppData\Local\Temp\geurge.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:4400
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
PID:892
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)3⤵PID:2096
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
PID:2492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\tujserrew.bat""2⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD517ca21ea226f7ad7b315ee607d4f9620
SHA13323c02573143594587b1f3e853497642026b0ca
SHA256a857973a19d8d4c412ce59aade69bc40fe41dc6a4b07c9b5e8ae004c08ce7d22
SHA51282ff51106ff7589573a1840baf8465b8bd35e8119d736fc6939fb1941f03c9ed35895b4900901234938715c31dbb2accc29b6ca0f4c4e3efef7d0d79193f7835
-
Filesize
218B
MD5a4628559f345f1beada131d9df0eef03
SHA107d81ee3fca5d7091691c834c7fd969f78f489b9
SHA256df26a907c7e1331b0bbfdafdf608e049540b3ac53e297488fbf8c77074f089f9
SHA512060929163a07ba227c18a489f9c230fb68d6bc8ffe496621599dafa7b64624fd2c20e1728cade35c5013bb1251485371f5ce9168c2ac49a64038f2d6d7420e07