Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe
-
Size
41KB
-
MD5
2148750449177e8ddaf033eeafdc85e3
-
SHA1
973ab3dded46d29e24451963c1f994f4ad34d0f7
-
SHA256
8f87673adcb28eac248f2901335bf16db475e29897a402bbd4b3d4833043a595
-
SHA512
c8a6bb07e9a3e4dce46faf5d188b11cecf41b5771c3d2587dff7bb440aba78107809c27ff638220478bfa5a42bcf9f6306e84341450830e8de1e4ce74b67ca3f
-
SSDEEP
768:NTL2wlO2Sy/z87NzzBpKoBGrTfBMbRcBgIxcrEQKZO5uQt1RSAh5dO2/pV+n4w6Q:V3loy/EpBpKOGrTZTZAO8kQt1R/5Y76Q
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\jsefusf\ImagePath = "C:\\Windows\\system32\\jsefusf.exe -service" 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2108 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 jsefusf.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\jsefusf.exe 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jsefusf.exe 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe File created C:\Windows\SysWOW64\jsefusf.exe jsefusf.exe File created C:\Windows\SysWOW64\KillMe.bat 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe File created C:\Windows\SysWOW64\jsefusf.dll jsefusf.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2488 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe 2464 jsefusf.exe 2464 jsefusf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2108 2488 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2108 2488 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2108 2488 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2108 2488 2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2148750449177e8ddaf033eeafdc85e3_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\KillMe.bat2⤵
- Deletes itself
PID:2108
-
-
C:\Windows\SysWOW64\jsefusf.exeC:\Windows\SysWOW64\jsefusf.exe -service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD5d35e61d3d0a13f356e3e5876c019046e
SHA15790d02d6f2cdb0aa2c1230c25251453ee62e3c9
SHA2562280ab8f5da1a6576e63d01b8d4fd9eef38cf34779d7e9d6c372c7fbb73633a3
SHA512daec962fc511523658f5a1f618c2ae1412ac925f83d87ef95b2d4177d3e3bd3bbcf73b4d006cd1837071e79c77cb086484cc3d5b3a22eba661b5d4ab35321257
-
Filesize
41KB
MD52148750449177e8ddaf033eeafdc85e3
SHA1973ab3dded46d29e24451963c1f994f4ad34d0f7
SHA2568f87673adcb28eac248f2901335bf16db475e29897a402bbd4b3d4833043a595
SHA512c8a6bb07e9a3e4dce46faf5d188b11cecf41b5771c3d2587dff7bb440aba78107809c27ff638220478bfa5a42bcf9f6306e84341450830e8de1e4ce74b67ca3f