Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe
-
Size
16KB
-
MD5
3866845a5ec9b47ce2df51025a1bfa0b
-
SHA1
69cfb0d7f84e81b4fc491808413642beffea350b
-
SHA256
524b29eb85a279afeca8b7d0d6fd7cdd24d18e7c1a311a95d9b3f8a652cef8ff
-
SHA512
b17561816f811e41a71592809d13feb86e99a9c5a71199caff1316360244c84866af749535ed3d2f25c9349c6a1d6f36011dad22d0462eacbeb9a3ed40eccc1b
-
SSDEEP
384:Tz1snRhQX9V+hfSIMJnWOLCM0g1De5073V/u8FXu20nLjJi:F0M9charbGM0g1De5073VG8420nc
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ngykfdtu.dll = "{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}" 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ngykfdtu.nls 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ = "C:\\Windows\\SysWow64\\ngykfdtu.dll" 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ThreadingModel = "Apartment" 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07} 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2740 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 31 PID 1244 wrote to memory of 2740 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 31 PID 1244 wrote to memory of 2740 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 31 PID 1244 wrote to memory of 2740 1244 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2D09.tmp.bat2⤵
- Deletes itself
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD590c15833d1e13bfe9fabaae00133d15d
SHA14559d77cf9fa5f9d36a5bad1ce8c51be39a8a55d
SHA256b14d69da28f9395382524d6d585cf61c901f5ecc1ca0c9697ed835530a250015
SHA512a56fb90e77f88793c1415167800b3de0dcd745f625a7686ea03f1a86c04c270f3f7c608eb06274c2959c13b6cae5591051b4ce201393b298b4e5ad448be7dcff
-
Filesize
2.4MB
MD5777fe4cb7248cca7bbe1597d225ed706
SHA1cf0f1bf4ed0fda8fbe7b5aa2bfd9df5b5da4a4eb
SHA256c0197972a8301493c1ebe4f4be0248cc3ec5e2a7b19266f3a896ae6b17e44f33
SHA5122977a70949f11457387ad6cf18d89459cc051ada701f631d1cec46a1cf3d0d10d697a717023f41569b772cd1e9fa36d65139018f5a28c5c5f38f1190f7237d32