Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe
-
Size
631KB
-
MD5
35918a863217dfc0451e2ba7d26d6380
-
SHA1
5bfdd0fb5c41e177a05daba0285f1ec69d4e1271
-
SHA256
0690017b4af7a1c3aa237e5902d21e38f91d68f2d9036c191e4756cd66b762cc
-
SHA512
b1781779f4b0469f44b7562858fdff1cdd624a04235451cbe4e77ac857d60e28bbfd7178168ba021633a0af130b7ff2c307585ea651eda34778f86d853defb8c
-
SSDEEP
12288:UXFz23RuYQXkPtaqZ8bDS59aeqw+kQEaxol19VofYZuYg:/gr0PtaG59aaBQgl13rrg
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3036 СпмцйЛьЕша.exe 1720 СпмцйЛьЕша.exe 852 СпмцйЛьЕша.exe -
Loads dropped DLL 2 IoCs
pid Process 1656 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 3036 СпмцйЛьЕша.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 852 СпмцйЛьЕша.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1656 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 3036 СпмцйЛьЕша.exe 1720 СпмцйЛьЕша.exe 852 СпмцйЛьЕша.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3036 1656 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 30 PID 1656 wrote to memory of 3036 1656 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 30 PID 1656 wrote to memory of 3036 1656 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 30 PID 1656 wrote to memory of 3036 1656 35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe 30 PID 3036 wrote to memory of 1720 3036 СпмцйЛьЕша.exe 31 PID 3036 wrote to memory of 1720 3036 СпмцйЛьЕша.exe 31 PID 3036 wrote to memory of 1720 3036 СпмцйЛьЕша.exe 31 PID 3036 wrote to memory of 1720 3036 СпмцйЛьЕша.exe 31 PID 1720 wrote to memory of 2068 1720 СпмцйЛьЕша.exe 32 PID 1720 wrote to memory of 2068 1720 СпмцйЛьЕша.exe 32 PID 1720 wrote to memory of 2068 1720 СпмцйЛьЕша.exe 32 PID 1720 wrote to memory of 2068 1720 СпмцйЛьЕша.exe 32 PID 1720 wrote to memory of 2068 1720 СпмцйЛьЕша.exe 32 PID 1720 wrote to memory of 2068 1720 СпмцйЛьЕша.exe 32 PID 2648 wrote to memory of 852 2648 taskeng.exe 35 PID 2648 wrote to memory of 852 2648 taskeng.exe 35 PID 2648 wrote to memory of 852 2648 taskeng.exe 35 PID 2648 wrote to memory of 852 2648 taskeng.exe 35 PID 852 wrote to memory of 1728 852 СпмцйЛьЕша.exe 36 PID 852 wrote to memory of 1728 852 СпмцйЛьЕша.exe 36 PID 852 wrote to memory of 1728 852 СпмцйЛьЕша.exe 36 PID 852 wrote to memory of 1728 852 СпмцйЛьЕша.exe 36 PID 852 wrote to memory of 1728 852 СпмцйЛьЕша.exe 36 PID 852 wrote to memory of 1728 852 СпмцйЛьЕша.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35918a863217dfc0451e2ba7d26d6380_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\ProgramData\СпмцйЛьЕша.exe"C:\ProgramData\СпмцйЛьЕша.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exeC:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:2068
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B1266856-BE54-4BDC-B79A-FD153BE5D046} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exeC:\Users\Admin\AppData\Roaming\speedlink\СпмцйЛьЕша.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
631KB
MD535918a863217dfc0451e2ba7d26d6380
SHA15bfdd0fb5c41e177a05daba0285f1ec69d4e1271
SHA2560690017b4af7a1c3aa237e5902d21e38f91d68f2d9036c191e4756cd66b762cc
SHA512b1781779f4b0469f44b7562858fdff1cdd624a04235451cbe4e77ac857d60e28bbfd7178168ba021633a0af130b7ff2c307585ea651eda34778f86d853defb8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3502430532-24693940-2469786940-1000\0f5007522459c86e95ffcc62f32308f1_f42ec065-7b23-4f0f-9aa0-d097eed4c26e
Filesize1KB
MD58d327c082fba9d46c920b83f4cddfa89
SHA1bd067795db202d2026b0b24709dd97f0bb323ab1
SHA2565791e8bed2bad38c7e3d70db715144bd03513bd55f4c473ad299a514d1f9be4b
SHA512136a8fab5bd9aa41875feb48609941f52f582b9f200dab2ef758eccab99d1f680c62cbc983a6e437fdb887c6fc5e22c78e1d682ff1f4569c9d4ac2188497001d