Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe
-
Size
98KB
-
MD5
2253c8da99eb1c32dae9568bb749a13f
-
SHA1
c073f6de200f85d652e6bd2eb8d58bdd94ccdc8d
-
SHA256
a425dd275e1b06734e737093123eae3a7d59a1e8449e789cd2d5c928640bcaa7
-
SHA512
27e3973171ee5ff055add2009825adc68246c08db7b162de6473d8bac9cd2d3fd0b3a7493cc080580bad6fa12650db026e476d1e76a5ee9680265f44d885107d
-
SSDEEP
1536:rvcnFivCOLJVj7hH+sONVPVAtXghxNKOXGlT1EZ1o8g4VrGvrkyKSPGwJn+fj0BB:rUsJHO9SXwklT1Q1o8gMrSkyrO02K
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2224 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
fkgiwrm.exefkgiwrm.exepid process 2676 fkgiwrm.exe 2616 fkgiwrm.exe -
Loads dropped DLL 2 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exefkgiwrm.exepid process 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2676 fkgiwrm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\fkgiwrm.exe\" /r" 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exefkgiwrm.exefkgiwrm.exedescription pid process target process PID 1516 set thread context of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 2676 set thread context of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2616 set thread context of 2736 2616 fkgiwrm.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 1 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exepid process 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exefkgiwrm.exefkgiwrm.exedescription pid process target process PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 1516 wrote to memory of 752 1516 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe PID 752 wrote to memory of 2676 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe fkgiwrm.exe PID 752 wrote to memory of 2676 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe fkgiwrm.exe PID 752 wrote to memory of 2676 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe fkgiwrm.exe PID 752 wrote to memory of 2676 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2676 wrote to memory of 2616 2676 fkgiwrm.exe fkgiwrm.exe PID 2616 wrote to memory of 2736 2616 fkgiwrm.exe svchost.exe PID 2616 wrote to memory of 2736 2616 fkgiwrm.exe svchost.exe PID 2616 wrote to memory of 2736 2616 fkgiwrm.exe svchost.exe PID 2616 wrote to memory of 2736 2616 fkgiwrm.exe svchost.exe PID 752 wrote to memory of 2224 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe cmd.exe PID 752 wrote to memory of 2224 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe cmd.exe PID 752 wrote to memory of 2224 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe cmd.exe PID 752 wrote to memory of 2224 752 2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe cmd.exe PID 2616 wrote to memory of 2736 2616 fkgiwrm.exe svchost.exe PID 2616 wrote to memory of 2736 2616 fkgiwrm.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2253c8da99eb1c32dae9568bb749a13f_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\fkgiwrm.exe"C:\Users\Admin\fkgiwrm.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\fkgiwrm.exe"C:\Users\Admin\fkgiwrm.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2647.bat" "3⤵
- Deletes itself
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117B
MD531241121304eb0a316d4bee94941747b
SHA1104b63fa808538dd99b93e34d0db43f79510783d
SHA256e3e85a53c7fb0958ca30422898cdad65603c1cc4b26c1f077950c2a5b7521d54
SHA512a7341bd8c745372072b7eda8d5ba15b1f16e7d5ea0665d104643b466438d17fd99e15747e5ec9f74296b30c634e8ab2c45779cd4b10b3c44f49a862258e74793
-
Filesize
98KB
MD52253c8da99eb1c32dae9568bb749a13f
SHA1c073f6de200f85d652e6bd2eb8d58bdd94ccdc8d
SHA256a425dd275e1b06734e737093123eae3a7d59a1e8449e789cd2d5c928640bcaa7
SHA51227e3973171ee5ff055add2009825adc68246c08db7b162de6473d8bac9cd2d3fd0b3a7493cc080580bad6fa12650db026e476d1e76a5ee9680265f44d885107d