Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 18:37
Behavioral task
behavioral1
Sample
2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe
-
Size
115KB
-
MD5
2d6797e0e1239e03e2c0d81eab9fb6ed
-
SHA1
c3f207f3dd9cf18ba93a6d50f9c0e994bab85e8f
-
SHA256
b6f85009a39425d17614edfbbacdaf7e1c3515f7f0aa4c15373773cf30b969d6
-
SHA512
2a449fe205947aec1bde7fe917fd9b15cd9f704eab489363c545572f24fa183d0e850a7eeabd5b20e7fb51437e0e389cba8e3987a251e1073e383c7eb54f3772
-
SSDEEP
3072:cxnB8dJKODekMgXcglLmdNPWXsi7yrNoHgAnpcyuaU:tJKqc8CoX+ruHjpcx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2328-0-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2328-1-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2328-6-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-7-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/1656-26-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-36-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/1656-39-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-49-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-51-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-60-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-71-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-82-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-94-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-105-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-115-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-126-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/2904-139-0x0000000000400000-0x000000000043F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Installer = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\dtsc\\t.exe" t.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe 1656 t.exe 2904 t.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2328 2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2904 2328 2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe 32 PID 2328 wrote to memory of 2904 2328 2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe 32 PID 2328 wrote to memory of 2904 2328 2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe 32 PID 2328 wrote to memory of 2904 2328 2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe 32 PID 2904 wrote to memory of 1656 2904 t.exe 33 PID 2904 wrote to memory of 1656 2904 t.exe 33 PID 2904 wrote to memory of 1656 2904 t.exe 33 PID 2904 wrote to memory of 1656 2904 t.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d6797e0e1239e03e2c0d81eab9fb6ed_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\Microsoft\dtsc\t.exe"C:\Users\Admin\AppData\Roaming\Microsoft\dtsc\t.exe" up5342⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Roaming\Microsoft\dtsc\t.exe"C:\Users\Admin\AppData\Roaming\Microsoft\dtsc\t.exe" keep3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD58e59501fd892b1fed1f4eb167d5b5611
SHA1904f41548ec475f37bb216213c0393671579acda
SHA25646149bf329cf907da8dc94cb9f75c990e69140127261cf9e84eb2a3b0e15aa2f
SHA512b9149deba2287a4593174fe96d1cbdb4831f048815e0ab947163c6b71b96f14e9e67115cd675c6bb80e10ac9fb3d1da926d4c4f7db41a260826c80c635b076e5