Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
1549e4673531aefd4daf765e35247205_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1549e4673531aefd4daf765e35247205_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1549e4673531aefd4daf765e35247205_JaffaCakes118.exe
-
Size
454KB
-
MD5
1549e4673531aefd4daf765e35247205
-
SHA1
a2a94282db52615df2bde3659a39c731b46d6cd5
-
SHA256
1c6c28d40f6e0afbe38a7a8d3975410d12a37864990e4b7753bd99b681506fb9
-
SHA512
8d62cfdda5018857a2609b38c10381373f1f38dd2051258e4f6d8a135bffeaf6fdefdc8b5f703488c0ef796dfbee5e4c3c1b1a3128f4a51d155b9c655c7a17f3
-
SSDEEP
6144:4nk3e5+Bf44O4Bi8SvDz4iJ6/1CTYvhbtlUmz++S+MTp1Fwu+tFxF9t+EeeeuqMs:h3e5+BfO4BiL7tI2uWTp1u7ftxe2qSS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2296 Exprer.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Exprer.exe File opened (read-only) \??\R: Exprer.exe File opened (read-only) \??\S: Exprer.exe File opened (read-only) \??\Z: Exprer.exe File opened (read-only) \??\E: Exprer.exe File opened (read-only) \??\L: Exprer.exe File opened (read-only) \??\T: Exprer.exe File opened (read-only) \??\X: Exprer.exe File opened (read-only) \??\W: Exprer.exe File opened (read-only) \??\Y: Exprer.exe File opened (read-only) \??\J: Exprer.exe File opened (read-only) \??\K: Exprer.exe File opened (read-only) \??\O: Exprer.exe File opened (read-only) \??\U: Exprer.exe File opened (read-only) \??\N: Exprer.exe File opened (read-only) \??\P: Exprer.exe File opened (read-only) \??\V: Exprer.exe File opened (read-only) \??\G: Exprer.exe File opened (read-only) \??\H: Exprer.exe File opened (read-only) \??\I: Exprer.exe File opened (read-only) \??\M: Exprer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Exporer.exe Exprer.exe File opened for modification C:\Windows\SysWOW64\Exporer.exe Exprer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Exprer.exe 1549e4673531aefd4daf765e35247205_JaffaCakes118.exe File opened for modification C:\Windows\Exprer.exe 1549e4673531aefd4daf765e35247205_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell Exprer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID Exprer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} Exprer.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe 2296 Exprer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2296 2108 1549e4673531aefd4daf765e35247205_JaffaCakes118.exe 28 PID 2108 wrote to memory of 2296 2108 1549e4673531aefd4daf765e35247205_JaffaCakes118.exe 28 PID 2108 wrote to memory of 2296 2108 1549e4673531aefd4daf765e35247205_JaffaCakes118.exe 28 PID 2108 wrote to memory of 2296 2108 1549e4673531aefd4daf765e35247205_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1549e4673531aefd4daf765e35247205_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1549e4673531aefd4daf765e35247205_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Exprer.exe"C:\Windows\Exprer.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD51549e4673531aefd4daf765e35247205
SHA1a2a94282db52615df2bde3659a39c731b46d6cd5
SHA2561c6c28d40f6e0afbe38a7a8d3975410d12a37864990e4b7753bd99b681506fb9
SHA5128d62cfdda5018857a2609b38c10381373f1f38dd2051258e4f6d8a135bffeaf6fdefdc8b5f703488c0ef796dfbee5e4c3c1b1a3128f4a51d155b9c655c7a17f3