Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 05:45
Behavioral task
behavioral1
Sample
19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe
-
Size
51KB
-
MD5
19007cf9bdbfc864c540d51753a1e164
-
SHA1
9f3dcf497ddb911997b64df8d78a177873509404
-
SHA256
53a843f4944aa0791062b3bee2f61bf1aa83632440357ea4cf87bbba6c3d494f
-
SHA512
b7fa8c15b9523a234898acfa95a1e060bb40824fbc79bfe8d5f3ca12351dc2feab219ac7b883c7a74f6b22568636d2d632b3e2e3c74943d50b4899df3c43dffe
-
SSDEEP
1536:Ojo5gjkPOWvJ+EsLkDqvOmrdbYhQb2eNwH:dgMOOcMqvvbYhXGwH
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\nyqzb.sys 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\nyqzb.sys 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\oshc\ImagePath = "system32\\drivers\\nyqzb.sys" 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 3780 rundll32.exe 4180 Rundll32.exe -
resource yara_rule behavioral2/memory/5060-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/5060-12-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TQXu.dll 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\TQXu.dll 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe File created C:\Windows\SysWOW64\3152dG.bat 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2188 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4180 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4180 Rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3780 5060 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe 81 PID 5060 wrote to memory of 3780 5060 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe 81 PID 5060 wrote to memory of 3780 5060 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe 81 PID 3780 wrote to memory of 4180 3780 rundll32.exe 82 PID 3780 wrote to memory of 4180 3780 rundll32.exe 82 PID 3780 wrote to memory of 4180 3780 rundll32.exe 82 PID 5060 wrote to memory of 3148 5060 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe 83 PID 5060 wrote to memory of 3148 5060 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe 83 PID 5060 wrote to memory of 3148 5060 19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe 83 PID 3148 wrote to memory of 2188 3148 cmd.exe 85 PID 3148 wrote to memory of 2188 3148 cmd.exe 85 PID 3148 wrote to memory of 2188 3148 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19007cf9bdbfc864c540d51753a1e164_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\TQXu.dll,DllRegisterServer2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\system32\Rundll32.exe C:\Windows\system32\TQXu.dll,DllUnregisterServer3⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\3152dG.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- Runs ping.exe
PID:2188
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249B
MD5cb6ccbc1d1d379e217511dced65046bf
SHA1e73de9d45b5ae15e788f1fa668a4c7c913cefefc
SHA256bd6b376cfa703e498874fc891d68c2de6fdbc954437b60fce159f4f359f9ef8e
SHA5127f4f7b55317824f79dcac129a3a2356772699566fc2631581016f7fcc40e935dff4c2460ec060a0d54b2e2911625cf9eff32c51ff3b40fa9dd3247580a993479
-
Filesize
32KB
MD5219794da6bd32ff315778625687b169b
SHA189f3fff6273eb280da7026c24286d380a372aadf
SHA25647d2bc272ba23345b3a7a37234a9ee6899923034e83de4e40446006767b366e4
SHA512c289f3b17289401b89fa99790e63ba3fa72bf6bc7436d04d5fc333fab3d2cf8eb7ca1e5be89d070784dcf0925b4479db52b3ef38256b56c3b0ff91d4236ac6de