Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe
-
Size
376KB
-
MD5
3781ec2d5c3704d79bb46d276642e89f
-
SHA1
e84dead60655f1d64a2b5938073a75c8ffbe39ad
-
SHA256
00bbd692d9876a1f076cafd287610cf8e6f8b929b0c2c117676b0714c12cab1f
-
SHA512
1f38573a14f31e1de8c93e3b1403723268c181edc1abf4614e0d5217d3be88778252c09aec820fa7fb2f729e034210fd563e2b230472a73557922b0e629c4bb8
-
SSDEEP
6144:krT/et0DyEBu9F2idZecnl20lHRxp3gXe0M6E81xS0WcHpsFbBq9:krTW2CF3Z4mxxF0MHoTAFb+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1248 3.exe 4020 3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\qqmmck.vxd 3.exe File created C:\Windows\SysWOW64\qqmmck.vxd 3.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\InProcServer32 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\InProcServer32\ThreadingModel = "Apartment" 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\InProcServer32\ = "C:\\Windows\\SysWow64\\qqmmck.vxd" 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\InProcServer32\ThreadingModel = "Apartment" 3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F} 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\ 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\InProcServer32\ = "C:\\Windows\\SysWow64\\qqmmck.vxd" 3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F} 3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\ 3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92B1E826-2EEF-4435-8748-7639C7C9935F}\InProcServer32 3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3272 wrote to memory of 1248 3272 3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe 84 PID 3272 wrote to memory of 1248 3272 3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe 84 PID 3272 wrote to memory of 1248 3272 3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe 84 PID 1248 wrote to memory of 5040 1248 3.exe 85 PID 1248 wrote to memory of 5040 1248 3.exe 85 PID 1248 wrote to memory of 5040 1248 3.exe 85 PID 3272 wrote to memory of 4020 3272 3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe 86 PID 3272 wrote to memory of 4020 3272 3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe 86 PID 3272 wrote to memory of 4020 3272 3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe 86 PID 4020 wrote to memory of 1772 4020 3.exe 88 PID 4020 wrote to memory of 1772 4020 3.exe 88 PID 4020 wrote to memory of 1772 4020 3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3781ec2d5c3704d79bb46d276642e89f_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 3.exe_deleteme.bat3⤵PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 3.exe_deleteme.bat3⤵PID:1772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5b749d963db7a6d84b590792ea5fabb96
SHA1e5a93efe2c68ae85d797e0d2b65f8ff3cea528d6
SHA256d18dace0530043bdbd497047f860137f01beb650c89de68487edafe92a3b4946
SHA512bbe03d74e9c7f83c9893de28a3650b0655aa21d67e9854c499e0485e4ae0abcfe7ec92454fcf279f4f30f22aa2a4de9095b462374750e7fa85a89064ddc6b9f3
-
Filesize
144B
MD5a07c140242d501303a0c7a5ac913c0e1
SHA1c348157ab408927eb906d8e8ed8d38eb3e596349
SHA256b336029985b5f56777b70adfa74b0f05482f59c811f3a0522577113f9a8969ad
SHA5126487e47cfc10579d6f2e2285501de6be2ba87b98fe94dea926a0343f1478a4dd7b4a10c3c6c32c67f3d218a9e3b304994089ba4f6c3a239e2164d1548b08808d
-
Filesize
51KB
MD5cbbbdd1367971afcd5165b7e85509ef0
SHA178c7272e54321020b4c5c572dae373a0fc5c3e37
SHA25641f7b0c0c814b98124a2c8f31dcd6c0e9e136878e4594cb287f6115c0e4a647c
SHA51202e0fbcc1ae12887b3608dd6dc42e0f2157fbb73ba48d267731207a0fa5126c705e9949a07ba49b4e2f722410048daed74081d804949daebf23b27c2335de913