Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe
-
Size
413KB
-
MD5
233992fa2ca9ebc32d8eff143f157d76
-
SHA1
ebe38a6f6c1863b33bfcff432d2e28f1365ae316
-
SHA256
4bd6f8ff89484107ffa62e723bf2647102397e62ccd1c0ea6c0e80c53fdf89a9
-
SHA512
bca93461de3e404d57332dd7851125f63adbd3913805dcfb8dfddef71afc527f6624c2031ffbae771278d349dd386451ba573eca69e34ef2d8ce9626b9327b56
-
SSDEEP
12288:a36ok57VUdZTL5S3pJ21iFspPOK5eiB23+7Hb:a3548Dbp2K0aW+77
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 server1.exe -
Loads dropped DLL 2 IoCs
pid Process 2444 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 2444 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3044 set thread context of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1640 server1.exe 1640 server1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2444 3044 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 28 PID 2444 wrote to memory of 1640 2444 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 29 PID 2444 wrote to memory of 1640 2444 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 29 PID 2444 wrote to memory of 1640 2444 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 29 PID 2444 wrote to memory of 1640 2444 233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe 29 PID 1640 wrote to memory of 1188 1640 server1.exe 21 PID 1640 wrote to memory of 1188 1640 server1.exe 21 PID 1640 wrote to memory of 1188 1640 server1.exe 21 PID 1640 wrote to memory of 1188 1640 server1.exe 21 PID 1640 wrote to memory of 1188 1640 server1.exe 21 PID 1640 wrote to memory of 1188 1640 server1.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\233992fa2ca9ebc32d8eff143f157d76_JaffaCakes118.exe3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5a1435734641178734d320cf019b6cd94
SHA11dec60fe68cca4628cd8c7efe6fdabb018a863e5
SHA256b084b345f1ba0ec2beccfd7c74d711c88997d76b0a4f084172d2c496f5b2e15a
SHA51288debe3c7c99365477c0e215b55f3dbd89cc6f8fb023b9594ac3ebb2ad89524a31acc733dbde08b8ad8f1a5b9013e9359ef772f9b61990852de948427c71f36f