Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
2974e70f02767b10963e422142859413_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2974e70f02767b10963e422142859413_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2974e70f02767b10963e422142859413_JaffaCakes118.exe
-
Size
136KB
-
MD5
2974e70f02767b10963e422142859413
-
SHA1
10982b4f655d166b8145b14f57adae7b265a1559
-
SHA256
c24e9f212bf4aa4d09be65a48991d3d88a7f8c7964167b669655bae9fcf683aa
-
SHA512
f41fb5551cfa66f2efbc29ce7be0cfffba83309f37078346bdf01db0314f072626054a2eb34d4602b596b4cb74e6f068f65825a3a9a6872b115644c8c766d90a
-
SSDEEP
3072:kIMXId8aU3RrYoD5XulxqnDv9405BL6zl:xMPayR0oD5muDvi02Z
Malware Config
Extracted
tofsee
94.75.255.140
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2840 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
digm.exedigm.exepid process 2304 digm.exe 592 digm.exe -
Loads dropped DLL 3 IoCs
Processes:
2974e70f02767b10963e422142859413_JaffaCakes118.exedigm.exepid process 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2304 digm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2974e70f02767b10963e422142859413_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\digm.exe\" /r" 2974e70f02767b10963e422142859413_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2974e70f02767b10963e422142859413_JaffaCakes118.exedigm.exedigm.exedescription pid process target process PID 2152 set thread context of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2304 set thread context of 592 2304 digm.exe digm.exe PID 592 set thread context of 2928 592 digm.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
2974e70f02767b10963e422142859413_JaffaCakes118.exe2974e70f02767b10963e422142859413_JaffaCakes118.exedigm.exedigm.exedescription pid process target process PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 2152 wrote to memory of 304 2152 2974e70f02767b10963e422142859413_JaffaCakes118.exe 2974e70f02767b10963e422142859413_JaffaCakes118.exe PID 304 wrote to memory of 2304 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe digm.exe PID 304 wrote to memory of 2304 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe digm.exe PID 304 wrote to memory of 2304 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe digm.exe PID 304 wrote to memory of 2304 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 2304 wrote to memory of 592 2304 digm.exe digm.exe PID 592 wrote to memory of 2928 592 digm.exe svchost.exe PID 592 wrote to memory of 2928 592 digm.exe svchost.exe PID 592 wrote to memory of 2928 592 digm.exe svchost.exe PID 592 wrote to memory of 2928 592 digm.exe svchost.exe PID 592 wrote to memory of 2928 592 digm.exe svchost.exe PID 592 wrote to memory of 2928 592 digm.exe svchost.exe PID 304 wrote to memory of 2840 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe cmd.exe PID 304 wrote to memory of 2840 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe cmd.exe PID 304 wrote to memory of 2840 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe cmd.exe PID 304 wrote to memory of 2840 304 2974e70f02767b10963e422142859413_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2974e70f02767b10963e422142859413_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2974e70f02767b10963e422142859413_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\2974e70f02767b10963e422142859413_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2974e70f02767b10963e422142859413_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\digm.exe"C:\Users\Admin\digm.exe" /r3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\digm.exe"C:\Users\Admin\digm.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2928
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0676.bat" "3⤵
- Deletes itself
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0676.batFilesize
117B
MD50feb7f78ef7529d8b90cdcebaa44f7c1
SHA1f0b10ab3ccd7a6065cb3a6592b18cf45fc3c0873
SHA256420fc5b5a75282216ced2c4e4d1e974c31ef3c483ca93ed559684f3d6909a2bd
SHA51261b5f294d8669039f6175d5be9df13b974692b8743083e19515b3eab97ee8ddb60dd3fdca3951f45c58f02e799d1ed8a580832dedf33ffa96097f4faf26f325d
-
\Users\Admin\digm.exeFilesize
136KB
MD52974e70f02767b10963e422142859413
SHA110982b4f655d166b8145b14f57adae7b265a1559
SHA256c24e9f212bf4aa4d09be65a48991d3d88a7f8c7964167b669655bae9fcf683aa
SHA512f41fb5551cfa66f2efbc29ce7be0cfffba83309f37078346bdf01db0314f072626054a2eb34d4602b596b4cb74e6f068f65825a3a9a6872b115644c8c766d90a
-
memory/304-1-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/304-9-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/304-15-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/304-8-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/304-5-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/304-3-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/304-11-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/304-26-0x0000000000220000-0x0000000000257000-memory.dmpFilesize
220KB
-
memory/304-25-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/592-51-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/2152-13-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/2152-14-0x0000000000220000-0x0000000000257000-memory.dmpFilesize
220KB
-
memory/2152-0-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/2304-41-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/2304-27-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/2928-54-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/2928-48-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/2928-46-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2928-58-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/2928-59-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/2928-60-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/2928-71-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB