Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe
-
Size
155KB
-
MD5
28c5acfab1b4e99c5d77351b9b370aaa
-
SHA1
f83409a48a00d169e10af2297faac02cdf782f0c
-
SHA256
080c44bbf72e4d094d7584b366a3ef49f71bfdad33fac5d19873bf687feb5505
-
SHA512
e7ea8d564b225d4cb9999882136931f4c422b02370508aa007ae4369005fc13b45007ecb13dcacd822612f3c891571e7eb0c4a7a73c234ffd6474985eb2cd174
-
SSDEEP
3072:zjAsOEnnWUYDOrpG2Lc13n1AM/wXyJqjUzpZBM8naKFM4:9bG2LclxJGiLBjHl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2252 Wxibaa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Wxibaa.exe 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe File opened for modification C:\Windows\Wxibaa.exe 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Wxibaa.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Wxibaa.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Wxibaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Microsoft\Internet Explorer\Main Wxibaa.exe Key created \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Microsoft\Internet Explorer\International Wxibaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe 2252 Wxibaa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1664 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe 2252 Wxibaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2252 1664 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe 86 PID 1664 wrote to memory of 2252 1664 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe 86 PID 1664 wrote to memory of 2252 1664 28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28c5acfab1b4e99c5d77351b9b370aaa_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Wxibaa.exeC:\Windows\Wxibaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD547ea9d752f4c14513f58d472967f390c
SHA128f8a9801f582b5164f8e2198368087f9fb6d404
SHA256bf3ffbb58872befbd70b7ed649940e6325ae50374fc443038ea7581fd96f26db
SHA512bc16ad1ae68e283d61e8d0239bdd5734f71f261068271830bdcb324bddfbdd1a7abe5df6d45d446d250c2f3f4300c8528bb9449e6252eb3fca35d76731112e42
-
Filesize
155KB
MD528c5acfab1b4e99c5d77351b9b370aaa
SHA1f83409a48a00d169e10af2297faac02cdf782f0c
SHA256080c44bbf72e4d094d7584b366a3ef49f71bfdad33fac5d19873bf687feb5505
SHA512e7ea8d564b225d4cb9999882136931f4c422b02370508aa007ae4369005fc13b45007ecb13dcacd822612f3c891571e7eb0c4a7a73c234ffd6474985eb2cd174