Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe
-
Size
15KB
-
MD5
241499c2b0f2f6eb6ffe698cd2ca71d8
-
SHA1
048d1d9184c0f0f1ad5a385f7c317113f89a4cc8
-
SHA256
cf48e53f82bfd09275c0be4fddafa614cab0d16f940786a364ede4b77b98dc56
-
SHA512
5b74ebc24dcc3afd90e3a9fde128406d91d9ca8701934b6abf8d7fa105417f7f2a9944b3136dda08b9e2215e426a24c1cbdca5cc66aba09319a98ec93ae8da99
-
SSDEEP
384:mhW/WwNeGOu1IkIuUdn2yXn447wycw9juWdJz4EigzT9J:Itn7Xn4EwKjJz4JgzTT
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\2E180CB6\ImagePath = "C:\\Windows\\system32\\2E180CB6.EXE -k" 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2992 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3048 2E180CB6.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\2E180CB6.EXE 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\2E180CB6.EXE 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe File created C:\Windows\SysWOW64\2E180CB6.EXE 2E180CB6.EXE File created C:\Windows\SysWOW64\2E180CB6.DLL 2E180CB6.EXE File created C:\Windows\SysWOW64\delme.bat 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2196 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe 3048 2E180CB6.EXE 3048 2E180CB6.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2992 2196 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2992 2196 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2992 2196 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2992 2196 241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\241499c2b0f2f6eb6ffe698cd2ca71d8_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
PID:2992
-
-
C:\Windows\SysWOW64\2E180CB6.EXEC:\Windows\SysWOW64\2E180CB6.EXE -k1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5241499c2b0f2f6eb6ffe698cd2ca71d8
SHA1048d1d9184c0f0f1ad5a385f7c317113f89a4cc8
SHA256cf48e53f82bfd09275c0be4fddafa614cab0d16f940786a364ede4b77b98dc56
SHA5125b74ebc24dcc3afd90e3a9fde128406d91d9ca8701934b6abf8d7fa105417f7f2a9944b3136dda08b9e2215e426a24c1cbdca5cc66aba09319a98ec93ae8da99
-
Filesize
239B
MD503fffe76a9e1896336ef1242e2519dcd
SHA1de30853697b4348e50cc5400517e01bf24ce1519
SHA256bd47c09cd36d94b1e14e0150b459a1f4189858ba438c3227ce504c6f250cf12a
SHA512533f2f6fb5f1fad8b83bb712c6bdc8c5955e5aeaa79f86dd335dc67c80cbdd4780d0fb9425642e0e35b32e03cb80f9c956e2394701ef4606f54ff014acd1ac84