Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe
-
Size
13KB
-
MD5
364207f4224d4b95bdc4f983b82569e2
-
SHA1
f264b02c27f6566e66d9ff4935d64f189f2da5b4
-
SHA256
bbcee4f0b127da013eb6c02a20cccb28fc41a848b4765b9b3ce136a7154e8651
-
SHA512
6636648463f8d1db52bfe1d63f3c81629f7af88984f3f1adb8041a514be33b472f22b41460d78e9522812c534bbaae95aee8e901cea5fd1b94520b2b81d251b4
-
SSDEEP
384:Kx4hKXHCuaP9yuxa+qZ4zsVCqTcrK7rPZ:ccAssxcrK7V
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\lweurqhx.dll = "{71A78CD4-E470-4a18-8457-E0E0283DD507}" 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2900 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\lweurqhx.tmp 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lweurqhx.tmp 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lweurqhx.nls 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ = "C:\\Windows\\SysWow64\\lweurqhx.dll" 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ThreadingModel = "Apartment" 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507} 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2900 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2900 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2900 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2900 2984 364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\364207f4224d4b95bdc4f983b82569e2_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5BC7.tmp.bat2⤵
- Deletes itself
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD55d8e1a8f79e0658211a69aa7095c702f
SHA1394d8c41e4c1f2d2cc1307530ba1dd0bea875156
SHA25607d9824270a3c51632dc6a4cea9e0f3a3b2a5df2dd36c8dd116f7488ea4ffab7
SHA51242f329cf6a2e59fec1e1b6c8632e518bfedee0c3a603fa1002544bcf715b6dcc82ce62d43a2af421b16ee867c8eb765f499ba3da13d8f7f2658375eea9958700
-
Filesize
428B
MD599a24facb7252a0fbdaee9c946244817
SHA1e44eb6e99677926c372c9fd99326258f58b8da5a
SHA2563e3309d3e67669ef8eefb00e032a4e0784ecf9b91482183bc5b494214f2f0156
SHA5125dbb7e06df8ba7776b703da76c7087a996a7a092c34dfbb8fd7719f51bb29250875d27328331d0469c904f2c6305818cf4a695cbe51435cb3a88aa05139ba1c9
-
Filesize
1021KB
MD5f13e84240f605976ad5a7c47bd02ee54
SHA105c0f864598b38d7e4f18ef40ac7fe97448eb6f8
SHA25629513e4530f5eca93414428d3fce2d8b5438ff8fb2942533c6d3f99dc70f0668
SHA512ef4ab5b65d4a6f39525cc31a07a43d624c839b1cdbbd014912c25d9296f296f282b3d5f27e12d09de554ce8204379215cfd8181d4daa5ec9035d3cc9e5be7059