Analysis
-
max time kernel
23s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
31092a371a630466d62b52c18f4e074e
-
SHA1
d2a2929c9e1860291bf912aaa2d88d5e15761c06
-
SHA256
7d909295d274b959148f457d191b1fccd435716205863a68767fca4992475294
-
SHA512
4543dff57f73fa022db61e385212be3002926bdce43d25f03396ea5250a572553f5695a3707e6dabb9a4d9c0dac9c3b68d351815ee7d5bfaa29805b69663a128
-
SSDEEP
49152:DXPopeICUoUpYXN595m2nuwJ9/I4kmLlq6EPKwmhxMyfOsu49v4WGBkjPAQN7L5e:fmgP/
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2920 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 rPE.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe = "C:\\Program Files" 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2360 REG.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2360 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2360 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2360 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2360 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2920 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 32 PID 2052 wrote to memory of 2920 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 32 PID 2052 wrote to memory of 2920 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 32 PID 2052 wrote to memory of 2920 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 32 PID 2052 wrote to memory of 2688 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 34 PID 2052 wrote to memory of 2688 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 34 PID 2052 wrote to memory of 2688 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 34 PID 2052 wrote to memory of 2688 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 34 PID 2052 wrote to memory of 2716 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 35 PID 2052 wrote to memory of 2716 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 35 PID 2052 wrote to memory of 2716 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 35 PID 2052 wrote to memory of 2716 2052 31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31092a371a630466d62b52c18f4e074e_JaffaCakes118.exe"1⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:2360
-
-
C:\Windows\SysWOW64\netsh.exe"netsh.exe" firewall set opmode disable2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2920
-
-
C:\Users\Admin\AppData\Roaming\rPE.exe"C:\Users\Admin\AppData\Roaming\rPE.exe"2⤵
- Executes dropped EXE
PID:2688
-
-
C:\WINDOWS\NOTEPAD.EXEC:\WINDOWS\NOTEPAD.EXE2⤵PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD597bdef637c1365cc4335361dfc39c135
SHA1cd3e3f3c3bb01d471e58dbc1f648fbcb6502c00b
SHA256c8e9fc6bc73dd2650afa7ff60228139a3e5341e0649aeab015904116c43eb812
SHA512e2d58538e63c2f1247f8d873c911af1976015d073c807dce258a7e79410f5a057bce5059eb8f9dbc1808f1cd6143d21f80725181a48df5612daa5c26d76b40b5