Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 22:30
Behavioral task
behavioral1
Sample
23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe
-
Size
26KB
-
MD5
23ab86e2c6b7e4d0b709ebc19310793a
-
SHA1
663ebbf278740c2dec0279b324580da012bf2d00
-
SHA256
f35b43e0c11a9beadaba20ff8b74fca4c94e7cda439960a2037538c9ae0334be
-
SHA512
9f9eff38c4de0094af9fcdb26b12674de65085c9267698899b88c0f1f456cd227c0b62d476f6f83cf046ad54cc37708e75d2b9cb337f3c81f3a7128a0b85a785
-
SSDEEP
384:QCwlMY4ntrjWpJ6ja8E3xraXq7PBZmFfWzdqTOwrPWkjmErjAxYr6+e9Pfqbn1f:QCwlMBnl46jqrKYaf4KrPhr0xPha5f
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\F7BE1713\ImagePath = "C:\\Windows\\Fonts\\4FD40F62.EXE -k" 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000a00000002338a-6.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 532 4FD40F62.EXE -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Fonts\D27E9EE1.DLL 4FD40F62.EXE File created C:\Windows\Fonts\del.bat 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe File created C:\Windows\Fonts\copy2090000.bat 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe File created C:\WINDOWS\FONTS\4FD40F62.EXE cmd.exe File opened for modification C:\WINDOWS\FONTS\4FD40F62.EXE cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE 532 4FD40F62.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4552 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 93 PID 4784 wrote to memory of 4552 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 93 PID 4784 wrote to memory of 4552 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 93 PID 4784 wrote to memory of 2812 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 99 PID 4784 wrote to memory of 2812 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 99 PID 4784 wrote to memory of 2812 4784 23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23ab86e2c6b7e4d0b709ebc19310793a_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Fonts\copy2090000.bat2⤵
- Drops file in Windows directory
PID:4552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Fonts\del.bat2⤵PID:2812
-
-
C:\Windows\Fonts\4FD40F62.EXEC:\Windows\Fonts\4FD40F62.EXE -k1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=4648 /prefetch:81⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD523ab86e2c6b7e4d0b709ebc19310793a
SHA1663ebbf278740c2dec0279b324580da012bf2d00
SHA256f35b43e0c11a9beadaba20ff8b74fca4c94e7cda439960a2037538c9ae0334be
SHA5129f9eff38c4de0094af9fcdb26b12674de65085c9267698899b88c0f1f456cd227c0b62d476f6f83cf046ad54cc37708e75d2b9cb337f3c81f3a7128a0b85a785
-
Filesize
152B
MD5fdfd0aaeae79bb7be8c30ca67909b0c3
SHA1cf13726f998c66c4f9a334cfdf1daf371549be90
SHA256aab60681f9bf2657549040086b5d7c48a97a3dd1aa327f8c34ffed89b465cc4f
SHA51235a0f58dc8c5ca2c49bd270798d348cd15a18b2fac2c23344c0d5aa2d08cd607beb0648e848cb75edab9fb321d0b0f5cd826c6eca39f284c51457bdf15166711
-
Filesize
239B
MD5cb76de6e59582eec4326865d86328150
SHA106e9dd818050395194a2fe64a40a70ed102f2834
SHA25680a859cdd3e9cac55050accc01504a4818a051e7e1d2cee4c43521c3e847dd53
SHA5127652bfcbc531a0993a4d246b9b810cddc55f3a6ecef7a53f372a33af710ad7bb669b633dd5a11fddf24609affc1ec9f5eeb64b47ced01e65df0998353c4110d1