Analysis
-
max time kernel
124s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
1c9020e46505023e9866b574333c7517_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c9020e46505023e9866b574333c7517_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1c9020e46505023e9866b574333c7517_JaffaCakes118.exe
-
Size
222KB
-
MD5
1c9020e46505023e9866b574333c7517
-
SHA1
146f37bed97262b1c1aded3f0334338c59898597
-
SHA256
2f33d2ea6fb304ae22d5521a4cc7e7f7e87b85c541693d4fd60109ae1d936a9e
-
SHA512
474425e8e87f944ac2fe6d37e6c7a9b9166b157ee94a3c6f2595e50bb6422927b4478f74933a2b303bf1c6fb40474b16b79015a2aaa54fbf5c30c16c6fe42aac
-
SSDEEP
6144:aKELo7vYSoZ/8RX55/rb99H1lYE4rmpRGt5u8RhgeRZ:mLorYH2p5/rbVlb4CmtWer
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1336 server1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c9020e46505023e9866b574333c7517_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1336 server1.exe 1336 server1.exe 1336 server1.exe 1336 server1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 432 wrote to memory of 1336 432 1c9020e46505023e9866b574333c7517_JaffaCakes118.exe 88 PID 432 wrote to memory of 1336 432 1c9020e46505023e9866b574333c7517_JaffaCakes118.exe 88 PID 432 wrote to memory of 1336 432 1c9020e46505023e9866b574333c7517_JaffaCakes118.exe 88 PID 1336 wrote to memory of 3388 1336 server1.exe 55 PID 1336 wrote to memory of 3388 1336 server1.exe 55 PID 1336 wrote to memory of 3388 1336 server1.exe 55 PID 1336 wrote to memory of 3388 1336 server1.exe 55 PID 1336 wrote to memory of 3388 1336 server1.exe 55 PID 1336 wrote to memory of 3388 1336 server1.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\1c9020e46505023e9866b574333c7517_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c9020e46505023e9866b574333c7517_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1280,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=3744 /prefetch:81⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD53ff043542d175ab1f1e6c9006f54c1f3
SHA1a8a5959d57ad48893ff6d5422732081ba8cee979
SHA25668d5393e75df72178c1f352ed8a912cf31a404c9aa95f5412dcbd8bc17539fd2
SHA512e7b54a5b31570ed39536b6e31d7e3682860aea01a96146aef8ee4fca0fd0060a401fec403ab8a4583eafa1d5ee923959a757a08fb7874120dba2960ea4b2fc02