Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe
-
Size
312KB
-
MD5
2ccfbfd59fc0069a655f26c7063a91d9
-
SHA1
4a892760457bd09d8ba73bc98fc840d98f8ba566
-
SHA256
fdf235a619e864c2250711d6f36633cb1a8151e7b11b81373759cabe5e19ed6f
-
SHA512
f12c13ca7e3a936d9e4a5929ea112c822916363b5c79e111238164ec00ed2b7f748bba19b57ebc2da6758d5ff60bb150e012bfb7b5469d661207e693e47e1a80
-
SSDEEP
6144:CwxRfTOZH+LAebATBJl7jAOS35KS4YfT:CwnGuAeUTPl7jgKdYf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\2CCFBF~1.EXE" 2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4604 4308 2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe 89 PID 4308 wrote to memory of 4604 4308 2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe 89 PID 4308 wrote to memory of 4604 4308 2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe 89 PID 4604 wrote to memory of 2260 4604 cmd.exe 91 PID 4604 wrote to memory of 2260 4604 cmd.exe 91 PID 4604 wrote to memory of 2260 4604 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.execmd /C "route.exe print > "C:\Users\Admin\AppData\Local\Temp\2ccfbfd59fc0069a655f26c7063a91d9_JaffaCakes118.tda""2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\ROUTE.EXEroute.exe print3⤵PID:2260
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,6959856223548986108,4217696995639198458,262144 --variations-seed-version --mojo-platform-channel-handle=4672 /prefetch:81⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD593aae103df31ea50c43b80f702d7416d
SHA1e3647d5be96704b774143360fd20a77077b4b576
SHA2567dfa08b01ae3b1e0468a728c869409b5e11dc88ba7e217ed7fa77d701fdb17b9
SHA51282d0b28c261921c60b52e405c65c2d10bdbf58dbf286f4cb55c5708324d1a9aac450c3320e3587cf1dd70589a67e47ecdc025e113b762c4eef3399d9e0459cf2