Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe
-
Size
392KB
-
MD5
2ff5ca3e7759afb743f4e57c9a825451
-
SHA1
d7f37c0a3a3e1514ef85646726aa7795fe536860
-
SHA256
95efec2d76ce181a538501eaa8d842b8fcff9562c038b4bfc2c79ec9785de26f
-
SHA512
3ec7ef42944468ad23d016a2502b6e38a33e656deb77105e04876fc0013563116b6a77c3c38fa4e5e48156ab5a5a6e357f80fab4a04e0722d8b222b476996c39
-
SSDEEP
6144:48DIpZ8df86s0iC5sMwQ3BT+iNNJajBaiOVMIIy360VNJ9kVclv:4ZpOfqC5sNQRC8HajBaLMobVNJ9ec
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2840 aE31004FfEnB31004.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 aE31004FfEnB31004.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2360-3-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2360-18-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2840-25-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2840-29-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2840-38-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2840-51-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral1/memory/2840-52-0x0000000000400000-0x00000000004BF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\aE31004FfEnB31004 = "C:\\ProgramData\\aE31004FfEnB31004\\aE31004FfEnB31004.exe" aE31004FfEnB31004.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main aE31004FfEnB31004.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe Token: SeDebugPrivilege 2840 aE31004FfEnB31004.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2840 aE31004FfEnB31004.exe 2840 aE31004FfEnB31004.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2840 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2840 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2840 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2840 2360 2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\ProgramData\aE31004FfEnB31004\aE31004FfEnB31004.exe"C:\ProgramData\aE31004FfEnB31004\aE31004FfEnB31004.exe" "C:\Users\Admin\AppData\Local\Temp\2ff5ca3e7759afb743f4e57c9a825451_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5722b0f0f7809a761ea8a438251eb7b72
SHA14c0b164611010bbea8c98d9b0d8344cd85ed3487
SHA2561b8a14831d87623f55cbfe63a94425a0c0c060f50b3939da16f44761f14d69b2
SHA512595ba0d9278e7e336e39cf8e82e306270ef3fa32812c384cd97a49d95df56753b6c6de5970efe5bc155b9c733bdf724d534e786beb776af8749526ca996fca3a
-
Filesize
392KB
MD593a8a4d79456fc2e6b508b5f0fcf0c6e
SHA18fcc7b93f516bf7f0a9d29b42b80c27c0bbae30f
SHA256e220642668986d99a84bbe9b400ff0a079edbdf2c214445c02e155044fad216b
SHA512711fb43f58031cf43ae57e8752c7af8d36a77ad78f84d795a81620f7764ba866810e690cd982b066a3b45353143ce97847fbcf89d3ef42d09852659f6494fe97