Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
1b824cd220a44f8fd840558753b33d65
-
SHA1
4815b0a76111b581784a395e24c66fc0c5b22763
-
SHA256
ce9ef1f5249afd70047e61f7515813d8683b536928517cde180e1acd2e1941c6
-
SHA512
fa69db4162edf9d10d07201ac5e085828c2537571e2941588c4e8174d2cf019b501184e87bf3a37feab8952c9d7698a0cb22160c35ea7f4a23075f4f2df9d479
-
SSDEEP
98304:izgmcGU8jrHdFZ9HLbZOCwn27CKT+y/dyVCBSwfXfmYAqL+5L5D/sBoyK:S0U9FZ9rb4n27p31ZBSGXuXq65tDsor
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2108 ebook.exe 2788 ebook.exe -
Loads dropped DLL 10 IoCs
pid Process 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 2108 ebook.exe 2108 ebook.exe 2108 ebook.exe 2108 ebook.exe 2108 ebook.exe 2788 ebook.exe -
resource yara_rule behavioral1/files/0x0008000000014b9e-3.dat upx behavioral1/memory/836-5-0x0000000003000000-0x00000000031D0000-memory.dmp upx behavioral1/memory/2108-18-0x0000000000400000-0x00000000005D0000-memory.dmp upx behavioral1/memory/2108-54-0x0000000000400000-0x00000000005D0000-memory.dmp upx behavioral1/memory/2788-56-0x0000000000400000-0x00000000005D0000-memory.dmp upx behavioral1/memory/2788-63-0x0000000000400000-0x00000000005D0000-memory.dmp upx behavioral1/memory/2788-65-0x0000000000400000-0x00000000005D0000-memory.dmp upx behavioral1/memory/2788-70-0x0000000000400000-0x00000000005D0000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main ebook.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\applications\ebook.exe\shell\open\command ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ebk\ = "digitaldm" ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\shell\open ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\ebook.exe ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\ebook.exe\shell\open ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\ebook.exe\shell\open\command\ = "C:\\Users\\Admin\\Documents\\My EBKs\\resources\\ebook.exe %1" ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ebk ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\applications\ebook.exe\shell\open\command ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\applications ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\Defaulticon\ = "C:\\Users\\Admin\\Documents\\My EBKs\\resources\\ebook.exe" ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\shell\open\command\ = "C:\\Users\\Admin\\Documents\\My EBKs\\resources\\ebook.exe %1" ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\Defaulticon\ = "C:\\Users\\Admin\\Documents\\My EBKs\\resources\\ebook.exe" ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\shell ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\ebook.exe\shell ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\Defaulticon ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\ebook.exe\shell\open\command\ = "C:\\Users\\Admin\\Documents\\My EBKs\\resources\\ebook.exe %1" ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ebk ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\Defaulticon ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\shell\open\command ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\shell\open\command\ = "C:\\Users\\Admin\\Documents\\My EBKs\\resources\\ebook.exe %1" ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\ebook.exe\shell\open\command ebook.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ebk\ = "digitaldm" ebook.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\digitaldm\shell\open\command ebook.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2108 ebook.exe 2108 ebook.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2108 ebook.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 836 wrote to memory of 2108 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 28 PID 836 wrote to memory of 2108 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 28 PID 836 wrote to memory of 2108 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 28 PID 836 wrote to memory of 2108 836 1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe 28 PID 2108 wrote to memory of 2788 2108 ebook.exe 29 PID 2108 wrote to memory of 2788 2108 ebook.exe 29 PID 2108 wrote to memory of 2788 2108 ebook.exe 29 PID 2108 wrote to memory of 2788 2108 ebook.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b824cd220a44f8fd840558753b33d65_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\drop\ebook.exe"C:\Users\Admin\AppData\Local\Temp\drop\ebook.exe" HSBC_RedandWhiteAprJun08_1272.ebk /sn2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\Documents\My EBKs\resources\ebook.exe"C:\Users\Admin\Documents\My EBKs\resources\ebook.exe" HSBC_RedandWhiteAprJun08_1272.ebk3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5dabdea7d526549c9b381206008f9b07a
SHA168897f4c29fe6e3b3b23b49928ef966d27d6ceda
SHA256988caaf1379907ddd84cefd8e5f1745f3ad2f26bef99710168aeaf98f538cc3c
SHA512144965afb551c2617a211c660192a17854ef1720daf6bbe535517415cd49d062651b310a36abc7065b0f6ed06b857126e69425479f7a0dbb549e60023b630bca
-
Filesize
9KB
MD512241ee654d9e3c44bcdc40009113d35
SHA158c216a0ce4a4d47d7272efd9894158718f95fe8
SHA256d1e4c5cc4c0ef2bb2588eeee05455945184f2a6269842804f72c9f4686ee44c4
SHA512bb00d00758fc51832f4dd110af67faa7af8bac0b902622d616686efdce654e9ad878f3cd7438556e724c06dab93c654bdf079bec89140a4ec99a1d6a7b1b1ccd
-
Filesize
276KB
MD598474b76f6e7d12b808f99c65d7d324e
SHA1b98fd9838fa87e1d95bee2a7521006e8c91d2c6f
SHA25691960d67071c95b753aa7712ce3e4058e69734fd2005a18ebe527ca476d52cc4
SHA51239d210de4420facf81a9df6fd760eaa4ab2ddfa7404fe5c5bd7316118214cbedae485e01bfc89d413ffe223c5d923de9734fe1a100316befc849dee04ebd92ed