Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe
-
Size
380KB
-
MD5
29dd3e66171031e3c8c770db8d3f9415
-
SHA1
cb8944854c1beb9f5cfa9aeffbb910c436201776
-
SHA256
d844b060afe3c2aff884c1ac3178a6a7ed03478d6be641c54efc6cd5957c3d53
-
SHA512
a0ab5294a10b5369e4f36c107086121c3080ca539b2f93c322f8c806dd6dc59183e8b99e0eb45e8fa549bfc2f69d14551f50ffa45b79706c760850e6ea6481d4
-
SSDEEP
6144:ZBPu1qF2idZecnl20lHRxp3gclk9ihl0/srEQpPK+e1FtEuxF+U2/kU:61mF3Z4mxxPoEtlK+kt9T2MU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\rejoice.exe" 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2124 cmd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\rejoice.exe 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rejoice.exe 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rejoice.dll 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe File created C:\Windows\SysWOW64\rejoice.dll 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe File created C:\Windows\SysWOW64\Deleteme.bat 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2444 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2444 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2444 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2444 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2124 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2124 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2124 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2124 2360 29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29dd3e66171031e3c8c770db8d3f9415_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"2⤵PID:2444
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5ebb254d17c2f71cb29c429a5c78b5a2b
SHA189a35165dad9b1da43ea821613e3e951f70816b8
SHA25662f2c616aa512d2cdb339ce16cf53a739970aca740854ec4868b1bbe75a953f0
SHA5125132d730233472dfc1236879a70524f70ead21dc2b4158cd01568fe4844bb37268000e2b5181c58f7e8f19f70199e86853d5984993cd4c302a3bfbdc57778265