Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 13:56
Behavioral task
behavioral1
Sample
1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe
-
Size
28KB
-
MD5
1b8f544f10cb311f271e4da55189b842
-
SHA1
e0a5fa9a5098e34df2ffd9938d1a94827f5d4420
-
SHA256
c35d980e38abea5b84c16e1c5386c3a4710b62294c5ea8dee6ee8cf6df2399ea
-
SHA512
42403839ec26405551f0d8c5dfc2241184d3c4681c9f8221e60b20464b1ad0ea61a304e70ce6a9f752926d86e4c2411247b74d1bb35dac64941f5d3972770ec1
-
SSDEEP
384:mvxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN1qgxOEJY:wv8IRRdsxq1DjJcqfjYY
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 1 IoCs
Processes:
services.exepid process 3612 services.exe -
Processes:
resource yara_rule behavioral2/memory/432-0-0x0000000000500000-0x0000000000510000-memory.dmp upx C:\Windows\services.exe upx behavioral2/memory/3612-6-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3612-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3612-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-25-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-26-0x0000000000400000-0x0000000000408000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\tmpFA02.tmp upx behavioral2/memory/432-97-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-98-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-185-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-186-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-187-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-188-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3612-193-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-209-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-210-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-216-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-217-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-220-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-221-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-349-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-350-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-503-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-504-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/432-640-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/3612-641-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exeservices.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
Processes:
1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exedescription ioc process File created C:\Windows\services.exe 1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe File opened for modification C:\Windows\java.exe 1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe File created C:\Windows\java.exe 1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exedescription pid process target process PID 432 wrote to memory of 3612 432 1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe services.exe PID 432 wrote to memory of 3612 432 1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe services.exe PID 432 wrote to memory of 3612 432 1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe services.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b8f544f10cb311f271e4da55189b842_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ccb4c257e051cdbf7a25e6c561830c64
SHA1a72a5630efb22615a7f0fb0f9470633a8e38f570
SHA256ab975a1c4a78ecc1d53c3accc168c9e26cf505afc52d434050181a077249de42
SHA51283742a1b0485ba0aae430ce1e14c933062be8b2ce12906f44578cbdd12df696d50a77eb43733c822872dc9d93b557cc1d74d22feb57f3ba5a69d56e2659888a3
-
Filesize
115KB
MD525cb355a4bbc7b76d41f0f53af50fae3
SHA10f0c1c5453d4fa6cd7ca090747bace0189216282
SHA256459d6edfb53bdf29bab768ece9f1e6c489a1b1f6c90d0376e9f875a9cc5981ef
SHA512b26d796b985eaa7c1349bc7a48a0ff63f56c93f551befdd23eecdf2968dc86990c20e2ae2efe459c56cdf62a608a8464baad5f43a6da438d4d0cf3de760c8d51
-
Filesize
131KB
MD50773cad3b5d6da8a20ab9757c904c17f
SHA16c059e342ee794199ce853560bb0f5270f94c53a
SHA256ff1f4d950fac9f475a2bb9cd12be4083dc935988c3334583b1023a1e25e93d90
SHA512a8cb5c307ce61296c8aa7fc3ded8b554f23eed28600636caba1b1c5eb41573e1660f8fea9ddafbf9c4a02979dabd68fb6104d7a603446499bb2f738aa0784160
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
151KB
MD596c56c720d2e42998e0bb51a70376254
SHA132b1d674a94a58269f11deeb1e03eec30e798de4
SHA256571d86af9a696535f89989378562c466d319b780f3ee8005d9192a5f4a4b593a
SHA512d82991acaa021f8f61a52c1a37a4d44f04fdc5f39d5f42ea596e4c30cba5a157cddbd07e556cdd1d8f8f1dacba5f9ca3ec222e0c749f3de295fee4f0647bf3ba
-
Filesize
309B
MD5d7c7d9a22116debe181b010d460c4449
SHA10ffe4c171565d8d152bba5444abcfe4c3bda1a0f
SHA256bdb7ac94dc916af2d7784a5c147167ce13e49d12baa9b8f3cccaf33e29419a7c
SHA5120fce80c4e1d764c4ecd93f763b43459f76909893992069225559aa43d92991e436263e43a14ecd080d0452ef0aec3c1742807f88b3d7badb6a5f78ec13a9efc8
-
Filesize
158KB
MD57019b57c67c81bd06646e9b927257202
SHA1ac8b65af5a54597c1a879dc0b7057cfe955c1e66
SHA2560b3c4a6faae3e158162697897a35188273641dbcbc99c78a8f043ba0b687946c
SHA51279d337bb5304d39fddd3df85f24062d8f7b10569b714495d92f17f3410ef54d1d34f433628d8f481df139622f80fc02df97b11cfef0c2b505e6b93c0cef822c5
-
Filesize
315B
MD514b82aec966e8e370a28053db081f4e9
SHA1a0f30ebbdb4c69947d3bd41fa63ec4929dddd649
SHA256202eada95ef503b303a05caf5a666f538236c7e697f5301fd178d994fa6e24cf
SHA512ec04f1d86137dc4d75a47ba47bb2f2c912115372fa000cf986d13a04121aae9974011aa716c7da3893114e0d5d0e2fb680a6c2fd40a1f93f0e0bfd6fd625dfa7
-
Filesize
1KB
MD535a826c9d92a048812533924ecc2d036
SHA1cc2d0c7849ea5f36532958d31a823e95de787d93
SHA2560731a24ba3c569a734d2e8a74f9786c4b09c42af70457b185c56f147792168ea
SHA512fd385904a466768357de812d0474e34a0b5f089f1de1e46bd032d889b28f10db84c869f5e81a0e2f1c8ffdd8a110e0736a7d63c887d76de6f0a5fd30bb8ebecd
-
Filesize
1KB
MD5211da0345fa466aa8dbde830c83c19f8
SHA1779ece4d54a099274b2814a9780000ba49af1b81
SHA256aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA51237fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca
-
Filesize
151KB
MD589890f8124859c27137412313a9ee1a9
SHA12b9c45bc8e541e438ecbcc04f20fa2ac7f3c0d01
SHA2563ccb431b5f389c27219b622c754a2e35f62fdf779cfeb732cebe4a25476ce7b4
SHA5127cada5e1b97aa94a296d14f190a49f512dd98f316b652befe9114457ca021b72ccfd052caba4d6e0d33ca00dbbfaa7999a083e159927fa8bc5ba91fba00bb290
-
Filesize
1KB
MD5ee4aed56584bf64c08683064e422b722
SHA145e5ba33f57c6848e84b66e7e856a6b60af6c4a8
SHA256a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61
SHA512058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6
-
Filesize
135KB
MD594d56630a1c25d0b30086188dfee8689
SHA1e7e3cd4f0a4c0d76158bddcbf8afb5492629798a
SHA256ec00b79a5a65e27637145ac3aed100534e3723ed462c767eb4b08a44b328d9fd
SHA512488c2194c0b28d25a3ab97cc47df1eaa2ab5c411173a9575c51dd92a444f9ce59813fce6cf5842e7c80f20bc3733eaeeb87d69881b06c8bd42467b5fbdf4ca4f
-
Filesize
103KB
MD5d5cfc39887281dcbb6741b65f2fd07a9
SHA1b600f16cdb7abf3d367a48bb80897ed41c658973
SHA25631376cb2bfee2afcc060f7d66dc3e3ce4763602854c7bf76ed13c87917f3d807
SHA51235d85f002b3b077a96a5663a6a8fad2d204a1812c6575e923c9c49ee47f98f5022d9c56f2ebab7913b35e699b8a817717859cddfde7e072bdc46e19b44577cf3
-
Filesize
137KB
MD5c90da09e275a3a6c24bac497614dd9a3
SHA14bbdf626906c54d1c0925fb8b6a725759b299ca1
SHA256f209febd60e0e3bb3ce75a7d0ff4e943bf2d5769a52915248d7faa421ca826f3
SHA5122c60cbe1ad62df8c8d1ff53f2f1ce03eb97a225c65f1ce5fe624875bf215c40d9b4f08b0dac6d1d38973e71b96bb307d3d3a18126cf979162faea9869a2f87e9
-
Filesize
128KB
MD57b441546a900021ee424cff35a0e02dc
SHA1140d5e38878ebf3348cac61f9afad5617c6ed772
SHA256f318fe1f87573513e3fb5cc80225c73ba6ac482a3dc45557c16cb0bc96390c29
SHA512f7cf17759b5d49be0ddc21a08cb722c00191fc8b0e14c27d042615771dda3f2910057970e113c54df4ae342e00cdf01cb2de2023199f8df26fdd29da64f4dd39
-
Filesize
28KB
MD5e86a713e38965fb081becd06cbe597b6
SHA1f346c84131aee5581e181c0b21c4cb7ac2c24ada
SHA256cfb7b2408ad43d763f12221bf153da694babbb0bd3f509a275ec64cfb459507e
SHA512f64d586f9048bc5000141c840da9743576979f4d3b5b9b7dff968e7ace7495131d0f1d9a5d69b79468579d70543fec2c43835ec42575341e60aafec1b259f81f
-
Filesize
1KB
MD53c90167a9b2366f7a38fe15df73f99d7
SHA186075e05ab1926883ea7fbd9f6fe6aac8f73d964
SHA2560d5b88b9a75e0fd1b66576ff13ebcd87a1ed512925bb7ef444891b43854b4047
SHA512570796f0edfc20cb06743209688bbf0a8355e5adfbf675558e86d3d9e0bc6e2fae54a66e7e0cb88d7ee9ede808e2f1c02904bed6afd638cc053bb28065660771
-
Filesize
1KB
MD5351a479c8a7b63a734e02f8860204f3b
SHA146fdca26b8bb02a734c6ffda81eba9be8e24d192
SHA256e487385678b793c326ea8a23f610c527077a53406dc16b7f645be7fafbfaaa8e
SHA512cbf1cce533c49f33927be5b84d585a5e7ebd58ae836936b52395386373521349a41ab7b5bd17144a102964e6c3b96800abe26e77b84e60c87ade01ad511b54b8
-
Filesize
1KB
MD530ee628a5d95411318968b6cb2df8bbb
SHA1d8e2a2d65bf839457d00300ea38a525385599856
SHA256aaa136e71656a413a1e5f300d4c4e23af3ea9f4f56b34550ac4a1db3781d1a79
SHA512d3c188355f5e8b639853335eba76245f6906ea82dd4fd3b4e1ecc48d29bfb939bf9c8939a14a547ae683e103736e89ac497609cb71e52e7f2be5d9596be22911
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2