Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe
-
Size
912KB
-
MD5
3233ddeb354b7513eb814477bef54fca
-
SHA1
f7234caf62f99b42fca21b6011fbffa0475e52f8
-
SHA256
a70a36bd91ec5789913fee8983da5e5edfbf1b5854609fa9fb0d80a30fab3fde
-
SHA512
bccb1cc202fa8940c9b90becd435753c806a97199173e14bc538fa442dd505bfe5d364dd69418a69da6fae73e4b02342e74049864e251e6cd24d87edce446200
-
SSDEEP
24576:SVJuEskQC0HAqIYG3GNjAFjppJ8XLQlB5AjkKJC/ClNk5fpdbs:KFQCV4G3pFrJ8XEtAjkQaIwLo
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\marchi\Parameters\ServiceDll = "%SystemRoot%\\System32\\jwhpam.dll" aasd.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\marchi\Parameters\ServiceDll = "%SystemRoot%\\System32\\jwhpam.dll" aasd.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\marchi\Parameters\ServiceDll = "%SystemRoot%\\System32\\jwhpam.dll" aasd.exe -
Executes dropped EXE 2 IoCs
pid Process 2508 aasd.exe 4340 yong.exe -
Loads dropped DLL 2 IoCs
pid Process 2508 aasd.exe 2088 svchost.exe -
resource yara_rule behavioral2/files/0x00070000000234bb-20.dat vmprotect behavioral2/memory/2508-22-0x0000000010000000-0x00000000100B6000-memory.dmp vmprotect behavioral2/memory/2508-25-0x0000000010000000-0x00000000100B6000-memory.dmp vmprotect behavioral2/memory/2088-31-0x0000000010000000-0x00000000100B6000-memory.dmp vmprotect behavioral2/memory/2088-32-0x0000000010000000-0x00000000100B6000-memory.dmp vmprotect behavioral2/memory/2088-37-0x0000000010000000-0x00000000100B6000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\jwhpam.dll aasd.exe File created C:\Windows\SysWOW64\0005ccee.sys aasd.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 aasd.exe 4340 yong.exe 4340 yong.exe 2088 svchost.exe 2088 svchost.exe 2088 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2508 4636 3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe 82 PID 4636 wrote to memory of 2508 4636 3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe 82 PID 4636 wrote to memory of 2508 4636 3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe 82 PID 4636 wrote to memory of 4340 4636 3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe 84 PID 4636 wrote to memory of 4340 4636 3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe 84 PID 4636 wrote to memory of 4340 4636 3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3233ddeb354b7513eb814477bef54fca_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aasd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aasd.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yong.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yong.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4340
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k marchi1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD59942b11053b6bf303a891f430ad84dc7
SHA102f2c97c406267e6cc990378f86687c9c5ca281a
SHA256c5e775d263687bfc438c8a0c4d05b36e9539d81364cdba0306ca2e32eda00d6b
SHA512770dcb697e1abe7baac4ab0991ddb4685ac426c6eccc15ee248fafb7eb3f423b2c3e30ff2b981cc9b6bdb340aef1a8c9ca56be7b4facbabc4dac3f38463b63f7
-
Filesize
20KB
MD582d4d247bfd82e24a33e1025121b065a
SHA159a2d5c9a9e8a0ef8d1bf34af9fda10b856137f5
SHA25661f0343a6b5c5566ed175b450a7e8d15da3635aad9180aa28e412392240a91b5
SHA51290b7c411eef159df914304b264d9e79d0ecce787a9f7bb87a262bffedf234c94074e27449e42704a5f133489eea1fe18c9a7c0ee18e5c169576ae0777419c32d
-
Filesize
316KB
MD59d5abdba76028245a67bc96dda5c6272
SHA1681772f00a966dead7815199c9e3d42c76a14f1a
SHA256b3d9d74de1fdea7ac8d1a09b312308cf3adde8b72dcdf15d40881327a2e9e753
SHA51256d2724cc659246a0d90e3b002f2e75fec2eebc39d4f779df4f7b261d4f81a844e188852204e6e00128b815e776a52c11879b789bbb493efafd96402229f51b5