Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe
-
Size
44KB
-
MD5
16c73dea677363c947cdb1ddf368e966
-
SHA1
2751751b5b3d0b3007480ec98a89e0c4bc3569ec
-
SHA256
aaf87a5dda1ab6241e100039e7bf80fc128852855a6a3aa8cbe3edfa17948fd7
-
SHA512
1360100825c87193f26e33ab91b3733d4571803392aea10a62e998efbd214c149e61e41044a23b41f94c39d3b27ac1f9580e006ca49fbeaa75f2556c6266fb05
-
SSDEEP
768:GxWyFMPYLT9mr8W21Nu+8rIplLpg3vS7IkTGEvH:woYdmr8W27uWe3u
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2160 server.exe 2972 cuoh.exe -
resource yara_rule behavioral2/files/0x000900000002341f-4.dat upx behavioral2/memory/2160-6-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/2972-12-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/2160-10-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Update = "C:\\Windows\\cuoh.exe" server.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\cuoh.exe server.exe File created C:\Windows\cuoh.exe server.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2160 4804 16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe 81 PID 4804 wrote to memory of 2160 4804 16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe 81 PID 4804 wrote to memory of 2160 4804 16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe 81 PID 2160 wrote to memory of 2972 2160 server.exe 82 PID 2160 wrote to memory of 2972 2160 server.exe 82 PID 2160 wrote to memory of 2972 2160 server.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16c73dea677363c947cdb1ddf368e966_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\cuoh.exe"C:\Windows\cuoh.exe"3⤵
- Executes dropped EXE
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD599632a6feffb44e88c20b3aec33d6ee8
SHA12712524c3e9924c097fb6b22210d336c5c757042
SHA256484602c639df1f77332e78561496e5d69bf4ef9ef9970f2ab0b8471dae07ff80
SHA51272eb8387b3779ecf96e0d707ce17f7dbebfdfe0328b43bde02e42e576624637308df6582633bc7411692a2b658dd851dc51d4ed42ae8108d426fe188aa7ad978