Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe
-
Size
88KB
-
MD5
21043a24d1eba20a0f2863701a223c16
-
SHA1
834f54e9f569d967fb765118074461c4eb2977c1
-
SHA256
67645c60fdda792665cca9368a86918ba87308cfefa68e086db0f292f60a240e
-
SHA512
bf710913e1468edf832c3a59d9f9ab444e88438672ba88aa46099ac90f9221639512959d04204891718d78e47b70ed3fa391dc4e200da84dffe00d5f25de2180
-
SSDEEP
768:B0CYjqdS2TQOO3YyIbqNkR8aeFhYGEhbWmB1LC0WvRmy0BDGTPKPmLO2LyH0L9Oy:BDyqYeQOSY+Fh0hbJ1L5KHlFT
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\orcToByloLatwe = "C:\\WINDOWS\\services.exe" reg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\services.exe 21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2288 reg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2288 2208 21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2288 2208 21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2288 2208 21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2288 2208 21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21043a24d1eba20a0f2863701a223c16_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add hklm\software\microsoft\windows\currentversion\run /v orcToByloLatwe /d C:\WINDOWS\services.exe /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2288
-