Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe
-
Size
5.1MB
-
MD5
2fc191768ec1fcd0c44ad515eba02785
-
SHA1
d7fac412a7fcfbdca078ebb1bc766cfea7330bf1
-
SHA256
bd966425c165a38e0f7d39cb433995a025915e4ed783f72e13dce8179c679f60
-
SHA512
a4e0f1c124d6180dbf605f5f6933f47701d208b3867d3953863f1647353dcce5aa2c70cc11cafe91084f154be27332f4d55dbf86fa4a55426b84749d3c8c4dc9
-
SSDEEP
98304:DeMoBWz/XJWOygAqSnA4YDf+ONRXQ+TBMb5ZreQvyYmRshs4p:lWy/XJWOyRqC1cfBNRXQUMb5ZreSyfuN
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2976 7za.exe 1988 Setup.exe -
Loads dropped DLL 3 IoCs
pid Process 2844 cmd.exe 2844 cmd.exe 2844 cmd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x002e000000015d14-40.dat autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main Setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1988 Setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 Setup.exe 1988 Setup.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2052 1768 2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2052 1768 2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2052 1768 2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2052 1768 2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2052 1768 2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2052 1768 2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe 30 PID 1768 wrote to memory of 2052 1768 2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2844 2052 WScript.exe 31 PID 2052 wrote to memory of 2844 2052 WScript.exe 31 PID 2052 wrote to memory of 2844 2052 WScript.exe 31 PID 2052 wrote to memory of 2844 2052 WScript.exe 31 PID 2052 wrote to memory of 2844 2052 WScript.exe 31 PID 2052 wrote to memory of 2844 2052 WScript.exe 31 PID 2052 wrote to memory of 2844 2052 WScript.exe 31 PID 2844 wrote to memory of 2976 2844 cmd.exe 33 PID 2844 wrote to memory of 2976 2844 cmd.exe 33 PID 2844 wrote to memory of 2976 2844 cmd.exe 33 PID 2844 wrote to memory of 2976 2844 cmd.exe 33 PID 2844 wrote to memory of 2976 2844 cmd.exe 33 PID 2844 wrote to memory of 2976 2844 cmd.exe 33 PID 2844 wrote to memory of 2976 2844 cmd.exe 33 PID 2844 wrote to memory of 1988 2844 cmd.exe 34 PID 2844 wrote to memory of 1988 2844 cmd.exe 34 PID 2844 wrote to memory of 1988 2844 cmd.exe 34 PID 2844 wrote to memory of 1988 2844 cmd.exe 34 PID 2844 wrote to memory of 1988 2844 cmd.exe 34 PID 2844 wrote to memory of 1988 2844 cmd.exe 34 PID 2844 wrote to memory of 1988 2844 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fc191768ec1fcd0c44ad515eba02785_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Lanceur.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Extract.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\7za.exe.\7za.exe e .\WebPlayerTV.7z -pjesuisadmin -y4⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe.\Setup.exe4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
574KB
MD542badc1d2f03a8b1e4875740d3d49336
SHA1cee178da1fb05f99af7a3547093122893bd1eb46
SHA256c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
SHA5126bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c
-
Filesize
21KB
MD5523c100a6fec6eb73c10a705ba1a232c
SHA1c6d6246e3a419033e405f057f38dcfec57eae628
SHA25673347a81d34cee029012392a51fdc62e3dd53eb1a1d0f42b62d0f5080058cd68
SHA512c4c7b0ea9aeff0dab543bda19862a078abce61fcaa1cf3a6c815dd52af34f31cdfc5042525ef02a908a9ebdb7c734c04a068c9593eaabdcee34d9aef38a2ece9
-
Filesize
87B
MD59495ff73014b8a17bd4798911ad097fa
SHA171b6db4d7e576cf8b1cbf93079397bc0c1ce46b2
SHA2560a59275adf474e7164e14a7e622ecb93f3a1477958e6e1e0de6d7ae2c6913a33
SHA51255062bb9381ac302367aeb43492613762434da730663891f577e050fcbc0993eaf19e96154adf4d669cb9587d8eef2a7ec96cb02b366db5d5c58b1eefe64ecd3
-
Filesize
115B
MD567eb1322395d41dddc9045b4eef2309d
SHA1b85b2332b9fd4ac03aec49a9291e90e8b96547a5
SHA25656ddc657309aeab74ca42cf466deac992da8a0054830340ba839ffdf1d242be4
SHA512de37b1358f639f6647e6ae99b6719a0ddf5e9b8f9e8ea33b6284ecac3d33650e9257a63697dcd5d79ee5ed2790ece0b3aca3332719f678ca89f3d4562b00603d
-
Filesize
83KB
MD528dc0b45783c14215f991b408239df98
SHA1769f6dd0d1339c38ef79312b3820f4b7015fc509
SHA2568f1bc22d4190fb27adc6724e9086bd77c17b90b09af35028ae8506c30e15667d
SHA512caca2a22463178d990a34ac824827a110cf4a70fbf4606fa15ea4a4034dcea499ad0cb4e2a401c9654cc635273f6db8600cc25a3fd13e6ab07a683b1b1dd373c
-
Filesize
4.6MB
MD5e5f2a0b8625a622c7fd8663f82f1f701
SHA13a0d4a5bb826360829225b30aa2f78a15676268c
SHA2562e1b3e531127bf1ed4df84746894b09e2bb05d26721ea138c971c46f5a302816
SHA51277c11fa98ed20aa3b477ebcb680da6f4ceb03bb1547fd9c6cfed81214657acad974ddcea8287206c9e4c44df37e53b93c124bc4e7ad8476d67dd4b4bc42d6d39
-
Filesize
360B
MD58d20560e2a5d85bff57e363281d590cf
SHA1627245463fbe5dcef39a805219f9b87c853c5709
SHA256a4bc8ef6e49c89c207d3908081c2422fe660a0f901cf87062a97141690980181
SHA512e54c8559a4c3c391c883c2ce01564d792937c7d623bf16bad07bce1dcff75356d0ebf6464488b3018d47878a3ebbfda02bcc2fd37944885b83589deaafe13f30
-
Filesize
16KB
MD52dc5eabf6bcfc144ec704ac1f989a5ec
SHA1b65899aca1833bca7530cc559bff6a5f540d8277
SHA256f16da6e85a5651698ecf9d277d101b74170a0f35e549f1272d7c978d06c9abb9
SHA5126a11c0f4bfa7951d223400cc548b7fa3c7a6bd5e941a452dbc094c3695162c5f63324ca6a5c84fb2180f5219cf4f0062ca7a63845f6253e22c7b73d49c824004
-
Filesize
796KB
MD534a3a483ce35669f9a6aa193d1b02a7e
SHA1cd8a0ad8029b6170c6e2d7a350bae96edefea596
SHA25633f1d28d8ae82d4479f39affb4b91293c06af52c1bebebda9ecfecc4eaa37923
SHA5125217fdf371bdc062bf8d3ad4f67baed3fe2f8fb26965935f2168006ba24a37361ba7703ac6799459ba40b4463db0cc6b81e9935c11b594915553a699eff2ee23