Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 00:52
Behavioral task
behavioral1
Sample
1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe
-
Size
494KB
-
MD5
1d2bd3085140b6785574212041ea086d
-
SHA1
b917601bf1feec81d510ca206dce239567a6610c
-
SHA256
280e3b80bc3c6c9ea3ca4fbb22e72dfbde1c52d78d45561e034dd23cd6d8c89e
-
SHA512
9ea5193a8924250e4b0e4c9d961bc43d2691d108c801d0fedd0d60bd65df0872c37e8b82582273072aa0847bfac4eb8169ff5e08dd0b7c3b68c0cc4f73a2e4ca
-
SSDEEP
6144:NKLOgsgomKLEFESGz0SPpeEPkPDPrzgtRY5RdrHc13FG9ItU6GvPwU:AOgwmisETzuaeDPvjJ81VGqK6GvP5
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2892 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
vapal.exetobop.exepid process 1812 vapal.exe 2380 tobop.exe -
Loads dropped DLL 2 IoCs
Processes:
1d2bd3085140b6785574212041ea086d_JaffaCakes118.exevapal.exepid process 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe 1812 vapal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
tobop.exepid process 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe 2380 tobop.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1d2bd3085140b6785574212041ea086d_JaffaCakes118.exevapal.exedescription pid process target process PID 1988 wrote to memory of 1812 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe vapal.exe PID 1988 wrote to memory of 1812 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe vapal.exe PID 1988 wrote to memory of 1812 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe vapal.exe PID 1988 wrote to memory of 1812 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe vapal.exe PID 1988 wrote to memory of 2892 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe cmd.exe PID 1988 wrote to memory of 2892 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe cmd.exe PID 1988 wrote to memory of 2892 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe cmd.exe PID 1988 wrote to memory of 2892 1988 1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe cmd.exe PID 1812 wrote to memory of 2380 1812 vapal.exe tobop.exe PID 1812 wrote to memory of 2380 1812 vapal.exe tobop.exe PID 1812 wrote to memory of 2380 1812 vapal.exe tobop.exe PID 1812 wrote to memory of 2380 1812 vapal.exe tobop.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d2bd3085140b6785574212041ea086d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\vapal.exe"C:\Users\Admin\AppData\Local\Temp\vapal.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\tobop.exe"C:\Users\Admin\AppData\Local\Temp\tobop.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5d9c9d01d0fa8792915944f3b7443e28b
SHA12a9cc2aa4e89a38842996ad05a0eab736a474240
SHA25671b3caa704553195a9e8d4e63786eecb65d5bf6134813567ebe812dad81f1aca
SHA51297bd8007fd50faa4fdc3fba6dc6ee259216ab80a1e170e50becd29353fcd1ae4e8d7e01325cebc3323cd163f2e104bd264faea2a34a43b38f134ec8f488600f6
-
Filesize
512B
MD5c4b646d7ce8eabb1ac3608cf026faf62
SHA1709271267709f90bfbc5f8ac3ab6c31faf8dff62
SHA25639e225e29d00554363f472ba12237f5deb8429a41c59003ce99f573cec66d4cc
SHA5121f3fbf9ede1aef3eaf161b1a2dae70fa13a4b6d6b81bad4e3bf780179c297aa2546fe1980719d5751d0319a8d6991fe13ad98faed2881b854a3a69c30683a852
-
Filesize
494KB
MD51c968eef8cf4661157b402855346ea6e
SHA17b2e2f58a886b2c76521f72afe1e1d16abb8a7e8
SHA2568bc6749ebf8570d4a1ff0946125ad8909dcdcdcbd3df8843aca91226565645f1
SHA512268601a5902be934f7d92657bbbfd88f396a3beee3a772e25fe1e5b91b345453052787b74f0ea6ae69a81afa591d4c15cfa5a618fe3505b8ece0496a8ff7c61b
-
Filesize
179KB
MD5d7982a22f54ff85e658a17a2f2a195db
SHA1d2ac7da817a573f3c10c953481aa16f08fc5dbdd
SHA256532da476634403e6d06e3004efdc7cc2eb40c459772f1e710958b8b70c52878d
SHA5121445795c857a122865709abcefebbc91ccf065c0673a413cd2694df3492b432b1af89b00af8c73f47b058ea813dab6a8240c436d70e0db8051510c22d0dd99b7
-
Filesize
494KB
MD573a5f2a7f165d466c3890d8ed876e309
SHA1b4e7c993fbe9122640b392a4dbccfea5a9d4d937
SHA25640cc6e39949522dd39562551753dc548ba066025105c6cbed6bf4fc26a6eba49
SHA51226788cc61c160dae90e23f70e955464c6aafe6b572caebc5f0a65213aadeb146e185e598e60b600104ff805407e5a46fbabb6f4d6d7ce0a74de956dc2aea6c6a