Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
21012d62a838dc37a068999ad1952716_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
21012d62a838dc37a068999ad1952716_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21012d62a838dc37a068999ad1952716_JaffaCakes118.exe
-
Size
540KB
-
MD5
21012d62a838dc37a068999ad1952716
-
SHA1
5b61cffdb878029d871940e2147c39ed3326ba57
-
SHA256
5092d179585b593f0dde154d9a2faea4e6fd12eb387bc37255db97be7eca6ff6
-
SHA512
f49a2b60cd519a50169407562d3391ea307fae923bb7f71356cb02975c212c88c73ea90a546b1e739c840e2ffb87199abb246c6359e027e7fa4fb950e2a4ba67
-
SSDEEP
6144:JQp+JFxjMwfEDLHlH7vUONYAVa+1a4KxTvb:Ji+PxTfEDLFbv9zb1aBxTvb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1104 496_496.exe -
Loads dropped DLL 1 IoCs
pid Process 2712 rundll32.exe -
Boot or Logon Autostart Execution: Time Providers 1 TTPs 5 IoCs
The Windows Time service (W32Time) enables time synchronization across and within domains.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz\Enabled = "1" 496_496.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz\InputProvider = "1" 496_496.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\W32Time\TimeProviders\xyz 496_496.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz 496_496.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\W32Time\TimeProviders\xyz\DllName = "C:\\TDDOWNLOAD\\\\KA6hW.8" 496_496.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2648 sc.exe 2636 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32\ = "=" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F7C9975-ECA1-4190-B0EB-E37BC5E40893}\LocalServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1104 496_496.exe 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 DllHost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1104 1440 21012d62a838dc37a068999ad1952716_JaffaCakes118.exe 29 PID 1440 wrote to memory of 1104 1440 21012d62a838dc37a068999ad1952716_JaffaCakes118.exe 29 PID 1440 wrote to memory of 1104 1440 21012d62a838dc37a068999ad1952716_JaffaCakes118.exe 29 PID 1440 wrote to memory of 1104 1440 21012d62a838dc37a068999ad1952716_JaffaCakes118.exe 29 PID 1104 wrote to memory of 2712 1104 496_496.exe 30 PID 1104 wrote to memory of 2712 1104 496_496.exe 30 PID 1104 wrote to memory of 2712 1104 496_496.exe 30 PID 1104 wrote to memory of 2712 1104 496_496.exe 30 PID 1104 wrote to memory of 2712 1104 496_496.exe 30 PID 1104 wrote to memory of 2712 1104 496_496.exe 30 PID 1104 wrote to memory of 2712 1104 496_496.exe 30 PID 1104 wrote to memory of 2636 1104 496_496.exe 31 PID 1104 wrote to memory of 2636 1104 496_496.exe 31 PID 1104 wrote to memory of 2636 1104 496_496.exe 31 PID 1104 wrote to memory of 2636 1104 496_496.exe 31 PID 1104 wrote to memory of 2648 1104 496_496.exe 33 PID 1104 wrote to memory of 2648 1104 496_496.exe 33 PID 1104 wrote to memory of 2648 1104 496_496.exe 33 PID 1104 wrote to memory of 2648 1104 496_496.exe 33 PID 1104 wrote to memory of 2528 1104 496_496.exe 35 PID 1104 wrote to memory of 2528 1104 496_496.exe 35 PID 1104 wrote to memory of 2528 1104 496_496.exe 35 PID 1104 wrote to memory of 2528 1104 496_496.exe 35 PID 2528 wrote to memory of 2600 2528 net.exe 37 PID 2528 wrote to memory of 2600 2528 net.exe 37 PID 2528 wrote to memory of 2600 2528 net.exe 37 PID 2528 wrote to memory of 2600 2528 net.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\21012d62a838dc37a068999ad1952716_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21012d62a838dc37a068999ad1952716_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\496_496.exe"C:\496_496.exe"2⤵
- Executes dropped EXE
- Boot or Logon Autostart Execution: Time Providers
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\windows\SysWOW64\rundll32.exeC:\windows\system32\rundll32.exe C:\TDDOWN~1\\KA6hW.8 itf23⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Windows\SysWOW64\sc.exesc stop w32time3⤵
- Launches sc.exe
PID:2636
-
-
C:\Windows\SysWOW64\sc.exesc config w32time start= auto3⤵
- Launches sc.exe
PID:2648
-
-
C:\Windows\SysWOW64\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:2600
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5fefdd837a01e4a4e8768438bd617da05
SHA18f1faeaa9a86502eae9f6e1919efff1afffa53eb
SHA256b20284b3d71bcf4f66b85ecd24c8e5fd3c91d6a1e9fec0b4c6929b84e6be3a89
SHA5127d51087cd1cda4c850c8615f29a0ab79b2778889b2caa9b6f257d242d94d1c0a477dffe8df4023a25f474317e2f0102192631890f9d1a0c61135fe11954ca89d
-
Filesize
157KB
MD543c7e1812a546ea9914e19c7fd606798
SHA1fdfb3e8a52ee07f3fbe0822478f6b8b83705ab1c
SHA256fca9cd165bd9123a09e0f66bd1f28c494080503c68ec50b4364a9ae483af28c9
SHA512e81083675e6d5d70a033b5e941b98df4afa1c33eb51145ce9d971d7080e3d8210a62139e16991ba07f21c8866b5767c6410a4d886d7fea564de2576a3d408a2a