Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe
-
Size
10KB
-
MD5
163c533ac5d98827946d63c57bd9e408
-
SHA1
69d795a0ca4dc7c34314c44f3268bba608bf7f7b
-
SHA256
4d3652fd89824157479660204648f005f8ea35f1aca2662c2e642cf5accf95d3
-
SHA512
46f7119ffbba1369757e65b1356110b5ee1ffa5d28df662d5f7b9c7e970949c4582049fb76c6083f29cdda1abb2db229465311e2e68042ff3123fd0667cb1ceb
-
SSDEEP
192:IT+rm4D1NMymRMAE9IxLdUXFKV1cHVGDhsa/kgUwur:IT+KsWFM39IxIkV6t
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\riapri.dll 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe File created C:\Windows\SysWOW64\riapri.dll 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{152D2432-37A2-324F-2A54-21BF5CF2F1A1}\InprocServer32 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{152D2432-37A2-324F-2A54-21BF5CF2F1A1} 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{152D2432-37A2-324F-2A54-21BF5CF2F1A1}\InprocServer32\ = "C:\\Windows\\SysWow64\\riapri.dll" 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{152D2432-37A2-324F-2A54-21BF5CF2F1A1}\InprocServer32\ThreadingModel = "Apartment" 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5076 wrote to memory of 3852 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe 90 PID 5076 wrote to memory of 3852 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe 90 PID 5076 wrote to memory of 3852 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe 90 PID 5076 wrote to memory of 816 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe 91 PID 5076 wrote to memory of 816 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe 91 PID 5076 wrote to memory of 816 5076 163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe 91 PID 3852 wrote to memory of 3484 3852 cmd.exe 95 PID 3852 wrote to memory of 3484 3852 cmd.exe 95 PID 3852 wrote to memory of 3484 3852 cmd.exe 95 PID 816 wrote to memory of 4080 816 cmd.exe 94 PID 816 wrote to memory of 4080 816 cmd.exe 94 PID 816 wrote to memory of 4080 816 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3484 attrib.exe 4080 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DeleteFileDos.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe" -r -a -s -h3⤵
- Views/modifies file attributes
PID:3484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\DeleteFileDos.bat2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\163c533ac5d98827946d63c57bd9e408_JaffaCakes118.exe" -r -a -s -h3⤵
- Views/modifies file attributes
PID:4080
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3844 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332B
MD5c548e16e22665e57cc0ab0d61ca9e59a
SHA1c1cc25db4ff66b018f297a04f86adf2e146eb028
SHA25638ec8cd7808c406662ccd3d011a0ba4a838e155b572620dbbe5ba9c6941f444c
SHA512c82dc41d79aebc63c3acc52b0652e38edca039b137ebf0b557475cad187dd40174dd135a60238aafa5bfa5790f866bcad4f9ea30e351857ec5ad27dff3d22b97
-
Filesize
15KB
MD54ae13fc187880d4265698e5b0b5603b8
SHA14362a23286dda62073b430b95100067a8c346f5d
SHA256b47b11c9ce2d4e570024948781ddadee558e33578d3504f058b45c5b70c27c32
SHA512b46457c65e164ab7923e6613295ff6077597c7d1a2db5fe3fae38eeb231561d8eb6c3046175656c560103361d4a4c6b8cc6b0475aec6d1a511ea5f01b1839191