Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe
-
Size
264KB
-
MD5
149bd7db631fd522efa8e620b9f3d358
-
SHA1
431316cbb279ef093e5dcf0e621faa2ada21fc9b
-
SHA256
a86db9a973c9fb32872a5b1fe3be5590cd60b75f95ce5ccc75a87a37b924931e
-
SHA512
e6c0c59e5b24d506184d4825cea847a55f3edc60bdf1242a4d2e9c03d8a972b1175e5c3fcc411539746dee394805ae457006d4a763786f11fef0b45b8e21e234
-
SSDEEP
6144:mbXtAESWd8qO8GumbZ4B7MjWJ44ohbKjm0i9Z5AaNdq:mrtz8uRBMjWJ44AKjm0i9Z5Xu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 216 spy-net.exe -
resource yara_rule behavioral2/files/0x0008000000023406-10.dat upx behavioral2/memory/216-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/216-14-0x0000000002190000-0x00000000021C2000-memory.dmp upx behavioral2/memory/216-17-0x0000000002190000-0x00000000021C2000-memory.dmp upx behavioral2/memory/216-18-0x0000000002190000-0x00000000021C2000-memory.dmp upx behavioral2/memory/216-21-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/216-25-0x0000000002190000-0x00000000021C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system\system.pif spy-net.exe File opened for modification C:\Windows\SysWOW64\system\system.pif spy-net.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 216 spy-net.exe Token: SeDebugPrivilege 216 spy-net.exe Token: SeDebugPrivilege 216 spy-net.exe Token: SeDebugPrivilege 216 spy-net.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 216 4816 149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe 81 PID 4816 wrote to memory of 216 4816 149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe 81 PID 4816 wrote to memory of 216 4816 149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\149bd7db631fd522efa8e620b9f3d358_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\spy-net.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\spy-net.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD51f93856d7f1be90279d77ac83f11655e
SHA1e6770a5fefd4c4c94f523ebdb7c82bd997bc3e2a
SHA256b81cefb55f01eef2b6a623c3ae3b716fe245099e10dfbf9587e82be203b6283e
SHA5122a6607e4b6f184766913f110e38e27cdb18089349463fc12c12eb3cd9cc3ad33358e82ff1c6133e19a5897315f3cb245774933d6030118347a1fae39d619fc8d