Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 14:08
Behavioral task
behavioral1
Sample
1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe
-
Size
10KB
-
MD5
1647d99b58dcf0e1fed7587a87e00820
-
SHA1
f9c6e449712dc86057a3ecd4f89798f5c41e85e5
-
SHA256
22d9a60c09466f554581cde1814ec746d0fe44461a9234801a45ecc8e26459d8
-
SHA512
4ef490b3c66873551926db9203dab0e29396dd075b0e5607e806a64c738105677c98111ff62531d6ca7ec16dd8c05e37695fd37cc1c6ea3e7d2aa6f04bf50466
-
SSDEEP
192:0UZuqGusyVHS5FpdhdH2imZ1Nq7jza2itLcgJ37+:9ZFGCHS7v2imZ1N4zkggB+
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 3048 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1900 reglakok.exe -
Loads dropped DLL 2 IoCs
pid Process 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1920-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0009000000015616-3.dat upx behavioral1/memory/1920-5-0x0000000000030000-0x000000000003F000-memory.dmp upx behavioral1/memory/1920-11-0x0000000000030000-0x000000000003F000-memory.dmp upx behavioral1/memory/1900-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1920-20-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\reglako.dll 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe File created C:\Windows\SysWOW64\reglakok.exe 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\reglakok.exe 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1900 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 28 PID 1920 wrote to memory of 1900 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 28 PID 1920 wrote to memory of 1900 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 28 PID 1920 wrote to memory of 1900 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 28 PID 1920 wrote to memory of 3048 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 29 PID 1920 wrote to memory of 3048 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 29 PID 1920 wrote to memory of 3048 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 29 PID 1920 wrote to memory of 3048 1920 1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\reglakok.exeC:\Windows\system32\reglakok.exe ˜‰2⤵
- Executes dropped EXE
PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1647d99b58dcf0e1fed7587a87e00820_JaffaCakes118.exe.bat2⤵
- Deletes itself
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD572836a54d97973b53e93f95b0256b01e
SHA13e535b553ff23b8c72538986f5137f65953f3c55
SHA256fe393b87bb93b4604eba23c2f9c4b8314bbba585816bb4c0cc580a18faaf9ca4
SHA512e52e8cf9aecea14ebd5d49d65c65e7f5fae83b4e6f6eee269146c49e17825a17787d81076beea3173ad9249aa299c1e6df7c718d7afb74c4ceebf7244040159f
-
Filesize
10KB
MD51647d99b58dcf0e1fed7587a87e00820
SHA1f9c6e449712dc86057a3ecd4f89798f5c41e85e5
SHA25622d9a60c09466f554581cde1814ec746d0fe44461a9234801a45ecc8e26459d8
SHA5124ef490b3c66873551926db9203dab0e29396dd075b0e5607e806a64c738105677c98111ff62531d6ca7ec16dd8c05e37695fd37cc1c6ea3e7d2aa6f04bf50466