Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 03:36
Behavioral task
behavioral1
Sample
2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe
-
Size
31KB
-
MD5
2ad90eb5c25cff5533eefbabd75a0ced
-
SHA1
06263ba435b3af9a86a8b2bfe8b6f34a0668a3dd
-
SHA256
f1125a96bfaf5593315ab70d94458fdae936882f83a30b9b0b48a0a4d1c2984e
-
SHA512
fbafba1678dc090f6e27ebdb776197d5e8fbf015234d40b137d167fffc234e181148180ed1b55c8e8eec611b800ab25f408fb0417a190a84d2fbe01c97f48953
-
SSDEEP
768:Rx1c2kbCkcXcsYK5/dQI+0MahTVLAxsCBiWXwV8+Wh/Z37:RGukc/YM/db+DahRLCBiWV+WPr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\iejore.exe" 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2184 iejore.exe -
Loads dropped DLL 2 IoCs
pid Process 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1068-3-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/files/0x0010000000011b9c-5.dat upx behavioral1/memory/2184-14-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/1068-28-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2184-30-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2184-36-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2184-44-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\iejore.exe 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Del.bat 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iejore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "yl39.com/Article/fuke/changjian/pqy/201005/24162.html" iejore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "µã»÷µ¯³öÍøÒ³¹ã¸æ¡£ÓÀ¾Ã¹Ø±Õµ¯³ö´°¿Ú£¡" iejore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "yl39.com/Article/fuke/changjian/pqy/201005/24162.html" iejore.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1068 wrote to memory of 2184 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 30 PID 1068 wrote to memory of 2184 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 30 PID 1068 wrote to memory of 2184 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 30 PID 1068 wrote to memory of 2184 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 30 PID 1068 wrote to memory of 2860 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 31 PID 1068 wrote to memory of 2860 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 31 PID 1068 wrote to memory of 2860 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 31 PID 1068 wrote to memory of 2860 1068 2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ad90eb5c25cff5533eefbabd75a0ced_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\iejore.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\iejore.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2184
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Del.bat""2⤵
- Deletes itself
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5be1001be2f14d2c31e2c359ab54c1f01
SHA1dd255e403504e892db47fdba1417f30f8849322f
SHA2560a73971071427db2e4c683809bd5612ee85a43d39cc92a54a0733aca6827bb54
SHA512c73e405cf7c92bf3ff7f9e82d92a16e0955bdfb2e1a7ae80c75ea7f8dd453d2d6a2d20a1ac6420183c4921b255addb4fe299075e98236f5a664fb91a5dcdd0bd
-
Filesize
31KB
MD52ad90eb5c25cff5533eefbabd75a0ced
SHA106263ba435b3af9a86a8b2bfe8b6f34a0668a3dd
SHA256f1125a96bfaf5593315ab70d94458fdae936882f83a30b9b0b48a0a4d1c2984e
SHA512fbafba1678dc090f6e27ebdb776197d5e8fbf015234d40b137d167fffc234e181148180ed1b55c8e8eec611b800ab25f408fb0417a190a84d2fbe01c97f48953