Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe
-
Size
5.4MB
-
MD5
261718443e3bb3b39b89766a86475b2b
-
SHA1
48f1b67fed46c5359ce25c6a9d19fecb5d728dbe
-
SHA256
7bca222ab9f77e52a9764e87516303cf8878dfe868c1a584bada081d05784da3
-
SHA512
d42bf1e04458ebe2821dc53dabe3d31f08ebe0f1bca83cf438efddef2bab2d61ab73f573c5f55e2eca6c2e979b5dc92e1f2bcd8428cbe0dd462940c15f4eccf2
-
SSDEEP
98304:feMiViDz9xx2tbdPGPJZX+p5I9XayBZJN/pCDRU0V1vXMOaRzaWIizqB7sINrB7:hRi+JIp5I9XrBxR631BceKYwINrx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
7za.exeSetup.exepid process 2696 7za.exe 2488 Setup.exe -
Loads dropped DLL 3 IoCs
Processes:
cmd.exepid process 2544 cmd.exe 2544 cmd.exe 2544 cmd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Setup.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
Setup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main Setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Setup.exepid process 2488 Setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Setup.exepid process 2488 Setup.exe 2488 Setup.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exeWScript.execmd.exedescription pid process target process PID 2020 wrote to memory of 2624 2020 261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe WScript.exe PID 2020 wrote to memory of 2624 2020 261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe WScript.exe PID 2020 wrote to memory of 2624 2020 261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe WScript.exe PID 2020 wrote to memory of 2624 2020 261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe WScript.exe PID 2020 wrote to memory of 2624 2020 261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe WScript.exe PID 2020 wrote to memory of 2624 2020 261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe WScript.exe PID 2020 wrote to memory of 2624 2020 261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe WScript.exe PID 2624 wrote to memory of 2544 2624 WScript.exe cmd.exe PID 2624 wrote to memory of 2544 2624 WScript.exe cmd.exe PID 2624 wrote to memory of 2544 2624 WScript.exe cmd.exe PID 2624 wrote to memory of 2544 2624 WScript.exe cmd.exe PID 2624 wrote to memory of 2544 2624 WScript.exe cmd.exe PID 2624 wrote to memory of 2544 2624 WScript.exe cmd.exe PID 2624 wrote to memory of 2544 2624 WScript.exe cmd.exe PID 2544 wrote to memory of 2696 2544 cmd.exe 7za.exe PID 2544 wrote to memory of 2696 2544 cmd.exe 7za.exe PID 2544 wrote to memory of 2696 2544 cmd.exe 7za.exe PID 2544 wrote to memory of 2696 2544 cmd.exe 7za.exe PID 2544 wrote to memory of 2696 2544 cmd.exe 7za.exe PID 2544 wrote to memory of 2696 2544 cmd.exe 7za.exe PID 2544 wrote to memory of 2696 2544 cmd.exe 7za.exe PID 2544 wrote to memory of 2488 2544 cmd.exe Setup.exe PID 2544 wrote to memory of 2488 2544 cmd.exe Setup.exe PID 2544 wrote to memory of 2488 2544 cmd.exe Setup.exe PID 2544 wrote to memory of 2488 2544 cmd.exe Setup.exe PID 2544 wrote to memory of 2488 2544 cmd.exe Setup.exe PID 2544 wrote to memory of 2488 2544 cmd.exe Setup.exe PID 2544 wrote to memory of 2488 2544 cmd.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\261718443e3bb3b39b89766a86475b2b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Lanceur.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Extract.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\7za.exe.\7za.exe e .\WebPlayerTV.7z -pjesuisadmin -y4⤵
- Executes dropped EXE
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe.\Setup.exe4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2488
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5523c100a6fec6eb73c10a705ba1a232c
SHA1c6d6246e3a419033e405f057f38dcfec57eae628
SHA25673347a81d34cee029012392a51fdc62e3dd53eb1a1d0f42b62d0f5080058cd68
SHA512c4c7b0ea9aeff0dab543bda19862a078abce61fcaa1cf3a6c815dd52af34f31cdfc5042525ef02a908a9ebdb7c734c04a068c9593eaabdcee34d9aef38a2ece9
-
Filesize
87B
MD59495ff73014b8a17bd4798911ad097fa
SHA171b6db4d7e576cf8b1cbf93079397bc0c1ce46b2
SHA2560a59275adf474e7164e14a7e622ecb93f3a1477958e6e1e0de6d7ae2c6913a33
SHA51255062bb9381ac302367aeb43492613762434da730663891f577e050fcbc0993eaf19e96154adf4d669cb9587d8eef2a7ec96cb02b366db5d5c58b1eefe64ecd3
-
Filesize
115B
MD567eb1322395d41dddc9045b4eef2309d
SHA1b85b2332b9fd4ac03aec49a9291e90e8b96547a5
SHA25656ddc657309aeab74ca42cf466deac992da8a0054830340ba839ffdf1d242be4
SHA512de37b1358f639f6647e6ae99b6719a0ddf5e9b8f9e8ea33b6284ecac3d33650e9257a63697dcd5d79ee5ed2790ece0b3aca3332719f678ca89f3d4562b00603d
-
Filesize
83KB
MD528dc0b45783c14215f991b408239df98
SHA1769f6dd0d1339c38ef79312b3820f4b7015fc509
SHA2568f1bc22d4190fb27adc6724e9086bd77c17b90b09af35028ae8506c30e15667d
SHA512caca2a22463178d990a34ac824827a110cf4a70fbf4606fa15ea4a4034dcea499ad0cb4e2a401c9654cc635273f6db8600cc25a3fd13e6ab07a683b1b1dd373c
-
Filesize
796KB
MD53f174085d55bd3029301ef3cfba2c11d
SHA1ac4095dca8a1e65e7ba36421a5eac32c54e49aae
SHA25605cf08cf1cd7b9232e3b68ee722e7f1e21befe598f5400c46d486f7c88b0fdba
SHA51274d2ba3f0544578275daaf290711d03b5b4145d8f8dfea77aac371077d26c97465764a2c4b86f4c13cdf8213ca12f6fe452ce40cdb4396c174f201fb5da2d9f0
-
Filesize
5.0MB
MD5bd35eb58ae8dd713776659af40cef34a
SHA107d16742b95460333c29ad79cd0f2ee82a351a32
SHA2566d7ac8302194e51c741ed6b2fd07780e957e9300a1d7e52eede8996dceb7d99a
SHA5120a118125a398ecbb544bdcf3b642e29390a0e22f12d782cefc636955d4cc6a61dc2224d9fe5bf34148608ed3af367a3327b071ff96d1d682c627da43a94040a2
-
Filesize
376B
MD58e43dcf6964a7c171a6d78722ea4b790
SHA1140bfed4b00aa4770089061413e89a6343957603
SHA25649a49886a4dcf7aa2356a818e8ee52d59b44ea372ae3645b38e68c3b22aaf677
SHA512d5967b3e26092caa10d32e1ba602eef505980b0e0f9de3e4860e01872ac3bbcf26ce07f9670289f7b72196e3007862872b6a7b4b634f41a27c0628232c9b06b2
-
Filesize
16KB
MD52dc5eabf6bcfc144ec704ac1f989a5ec
SHA1b65899aca1833bca7530cc559bff6a5f540d8277
SHA256f16da6e85a5651698ecf9d277d101b74170a0f35e549f1272d7c978d06c9abb9
SHA5126a11c0f4bfa7951d223400cc548b7fa3c7a6bd5e941a452dbc094c3695162c5f63324ca6a5c84fb2180f5219cf4f0062ca7a63845f6253e22c7b73d49c824004
-
Filesize
574KB
MD542badc1d2f03a8b1e4875740d3d49336
SHA1cee178da1fb05f99af7a3547093122893bd1eb46
SHA256c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
SHA5126bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c