Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe
-
Size
68KB
-
MD5
14865979b7de1bd85db6acfdc80f586d
-
SHA1
62b82f777b7adf1749129438a918568bb5dba199
-
SHA256
4053633e95b1cd13bd4148b4ab73800c9d4e31d5c32e243a383433b982db2c65
-
SHA512
f7ca61784980068dac771a73b525e3dd306db93a5b64045be9f071fc38d4533720e1e9fd540a1c0105c79608dcd239cf776c32986df8e510a315096b1069220d
-
SSDEEP
1536:MGf8Y252ssS2OEyGoEiObEIpk34bYesPPmDEKkObg7AIz8Qnh9u8nXPbLnnnnHUF:525A7qXwrQSEv7fz8BkUF
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 3 IoCs
pid Process 2120 ieagent.exe 1484 ieagent.exe 4324 ieassistant.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\ieassistant.exe ieassistant.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\ieassistant.exe ieassistant.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\ieagent.exe ieassistant.exe File created C:\Windows\SysWOW64\ieassistant.exe 14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ieassistant.exe 14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe File created C:\Windows\SysWOW64\ieagent.exe 14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe File created C:\Windows\SysWOW64\ieagent.dll ieagent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe 1484 ieagent.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2120 1948 14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe 81 PID 1948 wrote to memory of 2120 1948 14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe 81 PID 1948 wrote to memory of 2120 1948 14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe 81 PID 1484 wrote to memory of 4324 1484 ieagent.exe 83 PID 1484 wrote to memory of 4324 1484 ieagent.exe 83 PID 1484 wrote to memory of 4324 1484 ieagent.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14865979b7de1bd85db6acfdc80f586d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\ieagent.exe"C:\Windows\system32\ieagent.exe"2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Windows\SysWOW64\ieagent.exeC:\Windows\SysWOW64\ieagent.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\ieassistant.exe"C:\Windows\system32\ieassistant.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5be2f8e88f3734372bb6fdea308ff11b4
SHA14490d7a90998727bc882180c356fddb66d67798a
SHA2567e8de87bd8fe3c432400f5ff8fd96cf7273e01dc04ebf5b69217e9058358c6c9
SHA5125b2fae0f0076e4b91163ad254b3440f6653a4b7d0d005456ce7f9cdfec3f1d0add15bb0930e4f814c666375bf1f7557637f5128e74e94c98109fb623d022148b
-
Filesize
68KB
MD514865979b7de1bd85db6acfdc80f586d
SHA162b82f777b7adf1749129438a918568bb5dba199
SHA2564053633e95b1cd13bd4148b4ab73800c9d4e31d5c32e243a383433b982db2c65
SHA512f7ca61784980068dac771a73b525e3dd306db93a5b64045be9f071fc38d4533720e1e9fd540a1c0105c79608dcd239cf776c32986df8e510a315096b1069220d