Analysis
-
max time kernel
140s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe
-
Size
202KB
-
MD5
2d12d5515398d39ff5964cfb2f0c4786
-
SHA1
99dddacec9c7b10e344efdfd25b38765cb30ee46
-
SHA256
ab98a5f6d8ebdfd512746f65a31dbc6f899873c3f796bd911f895217cd5831c6
-
SHA512
c220dcf6f1101137b6eeebd5609635050e26095a505cb44b8c27954989a8c3d63fd6eb9dbee263d04660849b794190fb6fb6bd2651db75cb5e5ca82bf6a46ad6
-
SSDEEP
6144:cQH1TknB9azBa4mo3Sn9nkwqK0wCwfEXTbFfhOY2eu0s:cQH1TknB9ABagSnqQ0kfu1fhOY4
Malware Config
Signatures
-
Event Triggered Execution: AppCert DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1404 Explorer.EXE -
Loads dropped DLL 7 IoCs
pid Process 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2616 cmd.exe 2668 attrib.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\chkn_ssp.dll 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe File opened for modification C:\Windows\system32\chkn_ssp64.dll 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2736 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 29 PID 2528 wrote to memory of 2736 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 29 PID 2528 wrote to memory of 2736 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 29 PID 2528 wrote to memory of 2736 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 29 PID 2528 wrote to memory of 2616 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2616 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2616 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2616 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2616 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2616 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2616 2528 2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe 30 PID 2736 wrote to memory of 1404 2736 rundll32.exe 20 PID 2736 wrote to memory of 1404 2736 rundll32.exe 20 PID 2616 wrote to memory of 2668 2616 cmd.exe 32 PID 2616 wrote to memory of 2668 2616 cmd.exe 32 PID 2616 wrote to memory of 2668 2616 cmd.exe 32 PID 2616 wrote to memory of 2668 2616 cmd.exe 32 PID 2616 wrote to memory of 2668 2616 cmd.exe 32 PID 2616 wrote to memory of 2668 2616 cmd.exe 32 PID 2616 wrote to memory of 2668 2616 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2668 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\chkn_ssp64.dll",CreateProcessNotify3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259559018.bat" "C:\Users\Admin\AppData\Local\Temp\2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe""3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h"C:\Users\Admin\AppData\Local\Temp\2d12d5515398d39ff5964cfb2f0c4786_JaffaCakes118.exe"4⤵
- Loads dropped DLL
- Views/modifies file attributes
PID:2668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5d226a657b279c5fc0a892748230a56ff
SHA1fa7e4fb6d6de3c4769001cbfce0a00ba02ef28a5
SHA2569dae2767b8e3499d37418a75ddd04d457c7ec8d6c8f312ee109c95a8a97e7761
SHA51207d55ccf3b511c3be64f6dcd05cea3feaafb286196e5d7ba30016ab6d9c0d656fb7cde8eb1ce0ef28a41f1f3f00f0e29020c92479619fd43e4ed47b829f8bf2a
-
Filesize
68KB
MD55de8c753c5a55c5de9962fb9e514c27c
SHA1cca4ccb47f63d981cfe73eee0eefc57408746ca3
SHA2563c7695be8e54eea5e14a2217a9338a2b8be9a67c8a9108dc8515420aff9ed3b2
SHA5126b2b84986b04316040c71814c7781cb788bd67a194027fafaeb66b939a86e31ca45b25ddcb11cf52faf8eda478f7f893c85a6b0e9b5970fd52823148465d423a
-
Filesize
75KB
MD518f07ee4843f39c9415cf97d42d2f05d
SHA1efd7df3541af0a8488ecdd3e89eb8651a45decca
SHA25610a4cf1a1b35b82df1de7b2e8b0c104357513f2cba5ef47c53c03fdf81bee402
SHA512f3657770f5e08dfa09898e5b75cd65dc343256f51239c7e4fd025cc777da92eb75a9ca040acd41ca65b9b1b09d08e0b42719cb9272778a4d83720033d438ea89