Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 05:29
Behavioral task
behavioral1
Sample
37df077458e43eb706b80d27be285d52_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37df077458e43eb706b80d27be285d52_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37df077458e43eb706b80d27be285d52_JaffaCakes118.exe
-
Size
345KB
-
MD5
37df077458e43eb706b80d27be285d52
-
SHA1
0dd6432d8276086a5e3f18f2eac45b2a1cbde2e7
-
SHA256
14b70336cd626a6ad2f56d5f3058016db672e2c85d589c5542176cf55f6e94dc
-
SHA512
d5dcedf30e8a642502a4d67e8af89b392bd38ad157b3df986976aed3855c49333660e33c60e4fffdb200b3625cec5f93d37bc01de8b8338c18d43b154a68ee8d
-
SSDEEP
6144:vzMs/zw1vpM3BlfMkYmgtG94COSNsxRcM48SmYJ0KDpAysbRWOKJ/nxTXTcYT:7//zw1xM3nDgtG+CJN2RcMpYJlu7bRWb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2468 Ë¢×ê»ú~1.EXE 1232 350l.exe -
resource yara_rule behavioral2/memory/3232-0-0x0000000001000000-0x00000000010A8000-memory.dmp vmprotect behavioral2/memory/3232-1-0x0000000001000000-0x00000000010A8000-memory.dmp vmprotect behavioral2/memory/3232-18-0x0000000001000000-0x00000000010A8000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 37df077458e43eb706b80d27be285d52_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\350l.exe Ë¢×ê»ú~1.EXE File created C:\Windows\Delete.bat Ë¢×ê»ú~1.EXE File created C:\Windows\350l.exe Ë¢×ê»ú~1.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 350l.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2468 3232 37df077458e43eb706b80d27be285d52_JaffaCakes118.exe 84 PID 3232 wrote to memory of 2468 3232 37df077458e43eb706b80d27be285d52_JaffaCakes118.exe 84 PID 3232 wrote to memory of 2468 3232 37df077458e43eb706b80d27be285d52_JaffaCakes118.exe 84 PID 2468 wrote to memory of 3432 2468 Ë¢×ê»ú~1.EXE 88 PID 2468 wrote to memory of 3432 2468 Ë¢×ê»ú~1.EXE 88 PID 2468 wrote to memory of 3432 2468 Ë¢×ê»ú~1.EXE 88 PID 1232 wrote to memory of 4336 1232 350l.exe 89 PID 1232 wrote to memory of 4336 1232 350l.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\37df077458e43eb706b80d27be285d52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37df077458e43eb706b80d27be285d52_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ë¢×ê»ú~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ë¢×ê»ú~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat3⤵PID:3432
-
-
-
C:\Windows\350l.exeC:\Windows\350l.exe1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660KB
MD533f1a1aed5492a47497456150c4e94d3
SHA190f447d4ad760bdde647f802831e8a11e7cb0957
SHA256448fd421a5f1899c0fc7e73f35e333a2ee8f0dbb146f64798383537d505b7b54
SHA512f23b73d08fcd376de5581c5ae98413ae74bb3f4f6fa29ed000ca9a94e28bbe9284bd4565ce0d1acde9e695df395c24367b0196c6660fdd21662f1ffd9d9f24d0
-
Filesize
160B
MD507260fbb5d73969b25d9dbf9f313c56e
SHA168e91071bf094676136e8f6dc4eb794d52cc3782
SHA256553f99e33dc443a93755b2d9ab50986984632214e1eb4fc1516158dc45551bab
SHA51232c1abab6dba14c784a89e4ec19b724c71ab5e1816a585e4083b1772177c54361c8080ea307b0973f11ba574c997d936f9e1869f1845327dd860c55650c20045