Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 04:47
Behavioral task
behavioral1
Sample
335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe
-
Size
137KB
-
MD5
335885df4fc5f19bd0d86f39f5abbf33
-
SHA1
2a42fc61c40745baf2c2ba836b3c9b6440a4665b
-
SHA256
309f0dff02dd10b09c1fb8a5deab7684a0e5e956cb3473960813221cb4ba61e1
-
SHA512
c58b1710dc1706aea5e0d9a820c692854466d5f4d9d159da585440df5cdd58cc1cee7bcb4097b764e36fdd0e302876411d9919d1f282da945e61cd658036dd7a
-
SSDEEP
3072:FWuyq+DphTWLWfIo4Z23BCERu9AJTGd5Y:FWuyq6WLWf14Z2xPRuGFF
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mej2fd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eaodx4.exe" 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts eaodx4.exe -
Executes dropped EXE 2 IoCs
pid Process 1464 eaodx4.exe 860 eaodx4.exe -
resource yara_rule behavioral2/memory/4276-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x00090000000234da-5.dat upx behavioral2/memory/1464-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4276-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1464-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/860-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/860-19-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\u2vj2y2.log eaodx4.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3400 sc.exe 2288 sc.exe 2856 sc.exe 2776 sc.exe 4588 sc.exe 404 sc.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 1464 eaodx4.exe 1464 eaodx4.exe 1464 eaodx4.exe 860 eaodx4.exe 860 eaodx4.exe 860 eaodx4.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4276 wrote to memory of 1940 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 85 PID 4276 wrote to memory of 1940 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 85 PID 4276 wrote to memory of 1940 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 85 PID 4276 wrote to memory of 2288 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 86 PID 4276 wrote to memory of 2288 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 86 PID 4276 wrote to memory of 2288 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 86 PID 4276 wrote to memory of 2976 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 88 PID 4276 wrote to memory of 2976 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 88 PID 4276 wrote to memory of 2976 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 88 PID 4276 wrote to memory of 2856 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 89 PID 4276 wrote to memory of 2856 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 89 PID 4276 wrote to memory of 2856 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 89 PID 4276 wrote to memory of 1464 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 91 PID 4276 wrote to memory of 1464 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 91 PID 4276 wrote to memory of 1464 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 91 PID 4276 wrote to memory of 2304 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 94 PID 4276 wrote to memory of 2304 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 94 PID 4276 wrote to memory of 2304 4276 335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe 94 PID 2976 wrote to memory of 5032 2976 net.exe 95 PID 2976 wrote to memory of 5032 2976 net.exe 95 PID 2976 wrote to memory of 5032 2976 net.exe 95 PID 1940 wrote to memory of 1652 1940 net.exe 97 PID 1940 wrote to memory of 1652 1940 net.exe 97 PID 1940 wrote to memory of 1652 1940 net.exe 97 PID 1464 wrote to memory of 2000 1464 eaodx4.exe 98 PID 1464 wrote to memory of 2000 1464 eaodx4.exe 98 PID 1464 wrote to memory of 2000 1464 eaodx4.exe 98 PID 1464 wrote to memory of 4588 1464 eaodx4.exe 99 PID 1464 wrote to memory of 4588 1464 eaodx4.exe 99 PID 1464 wrote to memory of 4588 1464 eaodx4.exe 99 PID 1464 wrote to memory of 2896 1464 eaodx4.exe 100 PID 1464 wrote to memory of 2896 1464 eaodx4.exe 100 PID 1464 wrote to memory of 2896 1464 eaodx4.exe 100 PID 1464 wrote to memory of 2776 1464 eaodx4.exe 101 PID 1464 wrote to memory of 2776 1464 eaodx4.exe 101 PID 1464 wrote to memory of 2776 1464 eaodx4.exe 101 PID 1464 wrote to memory of 860 1464 eaodx4.exe 102 PID 1464 wrote to memory of 860 1464 eaodx4.exe 102 PID 1464 wrote to memory of 860 1464 eaodx4.exe 102 PID 2000 wrote to memory of 3180 2000 net.exe 107 PID 2000 wrote to memory of 3180 2000 net.exe 107 PID 2000 wrote to memory of 3180 2000 net.exe 107 PID 2896 wrote to memory of 620 2896 net.exe 108 PID 2896 wrote to memory of 620 2896 net.exe 108 PID 2896 wrote to memory of 620 2896 net.exe 108 PID 860 wrote to memory of 1148 860 eaodx4.exe 109 PID 860 wrote to memory of 1148 860 eaodx4.exe 109 PID 860 wrote to memory of 1148 860 eaodx4.exe 109 PID 860 wrote to memory of 3400 860 eaodx4.exe 110 PID 860 wrote to memory of 3400 860 eaodx4.exe 110 PID 860 wrote to memory of 3400 860 eaodx4.exe 110 PID 860 wrote to memory of 4484 860 eaodx4.exe 111 PID 860 wrote to memory of 4484 860 eaodx4.exe 111 PID 860 wrote to memory of 4484 860 eaodx4.exe 111 PID 860 wrote to memory of 404 860 eaodx4.exe 112 PID 860 wrote to memory of 404 860 eaodx4.exe 112 PID 860 wrote to memory of 404 860 eaodx4.exe 112 PID 4484 wrote to memory of 1128 4484 net.exe 117 PID 4484 wrote to memory of 1128 4484 net.exe 117 PID 4484 wrote to memory of 1128 4484 net.exe 117 PID 1148 wrote to memory of 4112 1148 net.exe 118 PID 1148 wrote to memory of 4112 1148 net.exe 118 PID 1148 wrote to memory of 4112 1148 net.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\335885df4fc5f19bd0d86f39f5abbf33_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
PID:2288
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵PID:5032
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\eaodx4.exeC:\Users\Admin\AppData\Local\Temp\eaodx4.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:3180
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
PID:4588
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵PID:620
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\eaodx4.exeC:\Users\Admin\AppData\Local\Temp\eaodx4.exe -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⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"4⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵PID:4112
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED4⤵
- Launches sc.exe
PID:3400
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵PID:1128
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED4⤵
- Launches sc.exe
PID:404
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\6yc5z8g43.bat2⤵PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD55d5cc8a255a39d4914be26ad987bae1e
SHA125dd23ca466fe0c7bc4437f85b0273e985480147
SHA256bfed6d4b07840e4054d928edfa522fc2fa241caab10aede9b4126b3617455950
SHA512e7adbd6dce71be392a6d6d5360543c4462c8f0374b9bbffd6232fca253e608a2e39fa9498d03345e34cee1534f394223a5eb70049032c3f4e925be453b4fedce
-
Filesize
137KB
MD5335885df4fc5f19bd0d86f39f5abbf33
SHA12a42fc61c40745baf2c2ba836b3c9b6440a4665b
SHA256309f0dff02dd10b09c1fb8a5deab7684a0e5e956cb3473960813221cb4ba61e1
SHA512c58b1710dc1706aea5e0d9a820c692854466d5f4d9d159da585440df5cdd58cc1cee7bcb4097b764e36fdd0e302876411d9919d1f282da945e61cd658036dd7a