Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe
-
Size
160KB
-
MD5
194e3167adf254ace0e1b356080f2dce
-
SHA1
ced10c7ec302e14bacfcf3a73761817eca29e318
-
SHA256
afe3f5145f36b02b02273f5a6ec2f2a042cfb5a70e5245b85fade0301969513a
-
SHA512
7b15d6236015770fb2b532fe17a8e8a534f902330115b9dd2bb9471f3bd4438cdcfd19fb42d6ec5a2fdba84eb659b677ea5225a3863e02fb7e7d15bd8c19d0dd
-
SSDEEP
3072:lGB8KaLmr9F2ZRNj/4tDtF53PbBqwEamLKbc8YVZfUHCFNmrSrpxEJmtVu38iUiN:Q6xL8KjcDP53owj7b9V6vpxE93a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 892 Dzufia.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe File created C:\Windows\Dzufia.exe 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe File opened for modification C:\Windows\Dzufia.exe 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Dzufia.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Dzufia.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Dzufia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main Dzufia.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\International Dzufia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe 892 Dzufia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 892 4796 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe 88 PID 4796 wrote to memory of 892 4796 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe 88 PID 4796 wrote to memory of 892 4796 194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\194e3167adf254ace0e1b356080f2dce_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Dzufia.exeC:\Windows\Dzufia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5194e3167adf254ace0e1b356080f2dce
SHA1ced10c7ec302e14bacfcf3a73761817eca29e318
SHA256afe3f5145f36b02b02273f5a6ec2f2a042cfb5a70e5245b85fade0301969513a
SHA5127b15d6236015770fb2b532fe17a8e8a534f902330115b9dd2bb9471f3bd4438cdcfd19fb42d6ec5a2fdba84eb659b677ea5225a3863e02fb7e7d15bd8c19d0dd
-
Filesize
390B
MD54df41e2ac2a4332ff305b5b904620355
SHA11c6aaf8d96ad7a0d005ea6a8cf8969ffd357d2de
SHA256e39be391b860a8c9825c70d16047cebe4c3b487b638182da7cdf0ca5ab6f314e
SHA512e23db1f628d2d2983c3d91dfb1206414a46e77739d76ecfa03528e7910317a03ddb90a874027d2a5537b212ffc0781dff5e6fe86ea94512f8df2faba82391390