Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe
-
Size
189KB
-
MD5
2eea1ac80810e7e2bec2af3b7910ea2e
-
SHA1
403b33aba60663b730210975b4229c4c758e5006
-
SHA256
fc1c04846cf922d045dfd2bce64ee8d7a8e9a8c5fbfd5a508b380426d1402998
-
SHA512
828cda3df4c958b18f6c97e39e219415fce7a7d68dfacc9bbbc4736d7ffe9d4a9ff8a32601725b94a6820c5105753ba0c76ed81b6b06dea33671617a3607933d
-
SSDEEP
3072:/ZicV8bfnAU9To69JiVkAu2AnkTPdrezrY2wa7xGDA88SswULwYK7JmcVeb:RicuvPvaVkzkTPArTwix3SsiYKm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 dplaysvr.exe -
Loads dropped DLL 3 IoCs
pid Process 2708 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe 2708 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe 2644 dplaysvr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2708 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe 2644 dplaysvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2644 2708 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2644 2708 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2644 2708 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2644 2708 2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\2eea1ac80810e7e2bec2af3b7910ea2e_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of UnmapMainImage
PID:2644
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD557ca0be7841ca37945919dfc56f736e4
SHA16d8f9d7b7d432b38e9b40cdfd85b5b611ee1026c
SHA25623dc8f257801f9d20f5173533c27b318fd26493b2f7b51ad9f51e906432a4260
SHA51291c44fdc3337af1d77c4965bc309610cec8a1e5f496da02cd8efc4ec2f38ac862eb4bdc837710726c9b93710191f732d99437abc4671866ad6c94198daf1d290
-
Filesize
121KB
MD50d41a48a44382089f88f223f677a735a
SHA1d633ad9b2390099d0775ca769f7a3d38a40713f7
SHA256a54d21872ea486d60a55d205a939935394de4c049eaf4a97e8a404fbbed37e46
SHA51208b2ed55c73f31e39ec0304cf9b402772e8942baa615c69827deb79e1874acca1e3df2e58441a7633de0dd950d07c25ee20d79d87476177ef08a35e0a6f67e7a
-
Filesize
884B
MD5b8dc34273f4a5febd78da41013fa38ea
SHA1d154c933e978a974bb26ef3f34310251e379bf17
SHA25669a9b750833e23b6fe85db441f896707c251f70b76cae72aba866f27a376aeb3
SHA512f4be940791a955fed2ce956c4fb45731c36cbd3d4f6b877585cced5dac1506e2be18f3a6047437d56328c6fbb2f3b536a07683c2058e316f27b36b567f93f87c