Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe
-
Size
390KB
-
MD5
23361342f83b0e3bdb16342b9826c6a1
-
SHA1
723fa58f4d583a39dbf05239c8c522333d8984dc
-
SHA256
11234ea136d4510b6c5e7f1123d02ca1b5a8d5d38ea017a38b8dd3dfa61ab880
-
SHA512
d2fb2e3cc3fde52b95b3a1fd89bfd03171c971dcc688b578a93f70bdac93240196979eca78d3279eb3f26062cd5849ae54cca4aa7e68c8668a7faaf45d10996e
-
SSDEEP
12288:Hb2l7v8t0u63yNFTUnaNNQrJw6TndaBuv0xV88:Halot0FsFTUafQdwMnnI3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 948 services.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\system\\services.exe" 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\system\ha_server_lang.ini services.exe File created C:\Windows\system\ha_server.ini 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe File created C:\Windows\system\services.exe 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe File opened for modification C:\Windows\system\ha_server.ini services.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 948 services.exe 948 services.exe 948 services.exe 948 services.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 948 services.exe 948 services.exe 948 services.exe 948 services.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 948 4420 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 81 PID 4420 wrote to memory of 948 4420 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 81 PID 4420 wrote to memory of 948 4420 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system\services.exeC:\Windows\system\services.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD52c8cf160eda17263b5412f0babaa1add
SHA1b50ff70f51bf40633f8b3f02c2bd0633e7ce3d9e
SHA256527397e3de0516b77ab2ae9ed6fe644036a23dbd17d2297a2ca6ed61ba49d1a7
SHA512b59f4cb54945e1c1fbc010ed41fdede2a6b3a1a2e1345bc9b5727f7f73cf1a6268b659370d47f730720930ea9dd993e0923980203069665fc79ecbf913694aed
-
Filesize
1KB
MD5aad4a95f28cbc98c4b0fe19a46c90535
SHA1cad2ecc478944819b55c5d62683c96d9f605fb25
SHA256592f372c9666cbaed25df0541dc43974ce01d82833525f7330c3f9da55c0d4bc
SHA512a5c39df4d4ec1ce1c42ec2dfb2f9b3f94524b4fe33d8c5e66c418d80fdf03256615f33f00643979e093f26ca010f5adc13efd4194e7ad6a322231f70aa4fd15c
-
Filesize
304KB
MD558716b4cfbf9dca9746798a50ea57202
SHA1a13d1b59a99a29727c81194014f6bdaa3c9e366f
SHA25632af77cac8915cd17874097228eb020a29cb1b7482427886e4609977d74804d4
SHA51234567e4cd26305bda2daaf576a1d767c623d844836156d6126021eaa26c5a3f541104833bafe3d3b1a67498302b9e2a2c918be202dcacc9b091957ac973dbaa6
-
Filesize
201B
MD571fe83f48f9a9fcaaf450508de6c2478
SHA10468a602eba1331c983b4feb5cc6c943c154b75a
SHA2565c3fb00b81a73fd25676e2d3862ac09f89c4a915b912431b4acc1f2516523471
SHA5125180cad24a4e79430928ce52375e87fdae2f4a6946948310f85227ace146e02c4bcd7203248833b0668e4b9154ad985b500029ba4da1cdeba552e9665ce18c62