Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe
-
Size
215KB
-
MD5
220b0b7a88d5ca30e0f1e627b5345022
-
SHA1
481765e756f6bef150b3bdd02ce48e2a0f14de42
-
SHA256
440ecb63108a9e3c198a312db3a62eba5dab2e24942e283caca4b376de36dab6
-
SHA512
9022d0ecb4b2f39cf8cb350ec8f989abe74eb5e8fc24f84da7c2c9a3f27b75d63aa2467363c7a3f29450990db050bcad8e8ac91402486d3fc48c2aa922505b6f
-
SSDEEP
3072:InX3XCe8rdRtdRdekC67H/6KdotvFqbLXoqgHDq+22OSLDEq2WdLnJQhjIL3ls+4:cXPmNEkCOH/6KdEdgkj3vLiwLnJADBj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2824 Crypted.exe 2784 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 2824 Crypted.exe 2824 Crypted.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsass.exe" Crypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsass.exe" Crypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2824 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2824 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2824 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2824 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 28 PID 2944 wrote to memory of 3060 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 29 PID 2944 wrote to memory of 3060 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 29 PID 2944 wrote to memory of 3060 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 29 PID 2944 wrote to memory of 3060 2944 220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe 29 PID 2824 wrote to memory of 2784 2824 Crypted.exe 30 PID 2824 wrote to memory of 2784 2824 Crypted.exe 30 PID 2824 wrote to memory of 2784 2824 Crypted.exe 30 PID 2824 wrote to memory of 2784 2824 Crypted.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\220b0b7a88d5ca30e0f1e627b5345022_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\lsass.exe"C:\Users\Admin\AppData\Local\Temp\lsass.exe"3⤵
- Executes dropped EXE
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Crypted.exeC:\Users\Admin\AppData\Local\Temp\\Crypted.exe2⤵PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD593b079aaed2cd8628726b9b63a17e3a4
SHA1d3fd1110095201b8818b32c17c1976c444f40ea1
SHA2562eb9f1e746112fd88c07099d3eb4dbf2818abe0c3f4a45cf884296506d150601
SHA5124bb96e7c33b8ede89fae85894ee149a10f1fec58f37b740685c3eb30a84ec53a844c4d38210f54ea483db3fb43e30f9827067b309884e673f85d25031a1ccd8f