Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
3785bf5aaf0d569feafcb95524065310
-
SHA1
73b44de602508ed824a303823bf8038c591bd2d5
-
SHA256
f68b0a4144bccde0de22748573b63944731399f7dfd177cfcc879948ae67aefd
-
SHA512
218d1471043f078ec6bf45493aa7b14e2c0cfac7d698eb94d400f46d5b8dd763a49d767382c4f73667d8b6ea5a6647728ad2f9b060f12a51519476924358b79f
-
SSDEEP
49152:C8ze6dKC1muTGm4woezLyXRbvG+w8+zeeUDM:1hKC1m8AwogLWg8+AM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1280 DiskTrix UltimateDefrag.exe 2576 UDefrag.exe -
Loads dropped DLL 4 IoCs
pid Process 2352 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 2352 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 1280 DiskTrix UltimateDefrag.exe 1280 DiskTrix UltimateDefrag.exe -
resource yara_rule behavioral1/memory/2576-62-0x0000000000400000-0x0000000000907000-memory.dmp upx behavioral1/memory/2576-55-0x0000000000400000-0x0000000000907000-memory.dmp upx behavioral1/memory/2576-54-0x0000000000400000-0x0000000000907000-memory.dmp upx behavioral1/memory/2576-77-0x0000000000400000-0x0000000000907000-memory.dmp upx -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: UDefrag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2576 UDefrag.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2576 UDefrag.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2576 UDefrag.exe 2576 UDefrag.exe 2576 UDefrag.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1280 2352 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1280 2352 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1280 2352 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 30 PID 2352 wrote to memory of 1280 2352 3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe 30 PID 1280 wrote to memory of 2576 1280 DiskTrix UltimateDefrag.exe 31 PID 1280 wrote to memory of 2576 1280 DiskTrix UltimateDefrag.exe 31 PID 1280 wrote to memory of 2576 1280 DiskTrix UltimateDefrag.exe 31 PID 1280 wrote to memory of 2576 1280 DiskTrix UltimateDefrag.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3785bf5aaf0d569feafcb95524065310_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\DiskTrix UltimateDefrag.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\DiskTrix UltimateDefrag.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\DiskTrix UltimateDefrag\40000050700002i\UDefrag.exe
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD58dd53b7971d765297a1edf5993807f0b
SHA1a3c58d222c710c3126daf0607dbe3c550780a7a1
SHA2569f0cb6725b0aea15fd27e6e6d8e9eb12b5c4f03bcc6e05c79dc2a45f9933eb9f
SHA512415bd0761e84fb974574412384b38b6c8ecd3a78f7dc7fde1930583ac5569143cceb7d6222c45955012fbe9906bbf0380c8f8c3aa92b7ec9c11eee0f28954465
-
Filesize
36B
MD56ad49ea16020e86d60bb131f6b3c7087
SHA12a54c1c68018b989649bfabda299b8a0cf4a071d
SHA25622aab00d360ed6ea7e379a5217a1e83167e96ef489d7993d44dd38e87ff0df3e
SHA5121f3264a61158608a3511173f7dd59d6997c56b1456344a4d00b382422dab7dd8743c238d934dc077b36253e1123fd1657c1a9b21f1a265dcf8d2ff51a7722a27
-
Filesize
7KB
MD54d6943ba4c97bcd917a0859b11c319fb
SHA1275554b3d17bea300b9a0ab05a37bc281e0d96f4
SHA256bf414de86b92c7c68c7cfe28c1ed63a829177eaef7ae2f8db580514f610e26dd
SHA512748b1090350a82b37aaf0da28dfa98e142ab28c07e21620907ca9bf4cedb05757ecdb74e99672351645c5fc2d3c06d72018ff55dfd0e570bf09ee1db9b7a0152