Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe
-
Size
116KB
-
MD5
37acdfcf9d911f82c7b7f7ce0ce03701
-
SHA1
c7e26432d1393e86b7a09c99849091f4daadaf9f
-
SHA256
1d8f8bdf9a2be9c7228c94502fef9b01d41a9a7574d0808e825c797b2f0f6600
-
SHA512
cdd752143be6ab581b539c111b08315325ceca99d22ea2e85f7b4397bc8ccdf06783e70ebc73ecd2e840e273fd9b43e892da1f78d1d93f0981f0dcf856e1f674
-
SSDEEP
3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5n/U:SZRcx5VMpOKXur2Qf+5n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 Xgymaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\3D26895M1Z = "C:\\Windows\\Xgymaa.exe" Xgymaa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe File created C:\Windows\Xgymaa.exe 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe File opened for modification C:\Windows\Xgymaa.exe 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main Xgymaa.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International Xgymaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe 2208 Xgymaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2208 2824 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2208 2824 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2208 2824 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2208 2824 37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37acdfcf9d911f82c7b7f7ce0ce03701_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\Xgymaa.exeC:\Windows\Xgymaa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
372B
MD56a5f39265f85c087def3b8ffb66741cd
SHA1aa63ac2df68f7fa4338714a05fe751b86a0b9439
SHA256dd1fe8c42828e2641a5d0b21927106f5f4d4dabe5f59a05ab2dece0e0bb9c788
SHA51210aacec5552449a1f42fe02a2c7a621f25d49cef8fe9f6f1caa4c635ecdad1b0fb06b26e884f95d53161dc9d78c8605418f9327e66e14c47e6bad35eaf1c478d
-
Filesize
116KB
MD537acdfcf9d911f82c7b7f7ce0ce03701
SHA1c7e26432d1393e86b7a09c99849091f4daadaf9f
SHA2561d8f8bdf9a2be9c7228c94502fef9b01d41a9a7574d0808e825c797b2f0f6600
SHA512cdd752143be6ab581b539c111b08315325ceca99d22ea2e85f7b4397bc8ccdf06783e70ebc73ecd2e840e273fd9b43e892da1f78d1d93f0981f0dcf856e1f674