Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe
-
Size
85KB
-
MD5
38d50b3ef5a0403986c3bdbebdd94207
-
SHA1
92a17658e6b0b5b0d035533258797413e8b84f5c
-
SHA256
20a9d6e9c6452db4bca47c3aa48bf2abd5ad0a01141e47be4e4ec0fd4c9b7597
-
SHA512
9b605f689369c25d78652ad50bdde21836f714318d77bf7f5d8f4d80302ad7f6f4c56753285ed29514abea4c829312d45fea9025318e707c56890f48353563d8
-
SSDEEP
1536:GyapL5ZVzu+ApVBxYhQfp5XmQwg/sdT46:BaLZVzu+ArPfp5XmPgEB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2948 arq1.exe 2840 arq2.exe -
Loads dropped DLL 4 IoCs
pid Process 2496 cmd.exe 2496 cmd.exe 2916 cmd.exe 2916 cmd.exe -
resource yara_rule behavioral1/files/0x0007000000012117-5.dat upx behavioral1/memory/2948-6-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2948-24-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\dxdgns.dll arq2.exe File opened for modification C:\Windows\SysWOW64\dxdgns.dll arq2.exe File opened for modification C:\Windows\SysWOW64\msvejl.com arq2.exe File created C:\Windows\SysWOW64\msvejl.com arq2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msagent\msnsuw.com arq2.exe File opened for modification C:\Windows\msagent\msnsuw.com arq2.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "No" arq2.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main arq2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2840 arq2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2840 arq2.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2496 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2496 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2496 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 31 PID 2072 wrote to memory of 2496 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2948 2496 cmd.exe 32 PID 2496 wrote to memory of 2948 2496 cmd.exe 32 PID 2496 wrote to memory of 2948 2496 cmd.exe 32 PID 2496 wrote to memory of 2948 2496 cmd.exe 32 PID 2072 wrote to memory of 2916 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2916 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2916 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 33 PID 2072 wrote to memory of 2916 2072 38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2840 2916 cmd.exe 35 PID 2916 wrote to memory of 2840 2916 cmd.exe 35 PID 2916 wrote to memory of 2840 2916 cmd.exe 35 PID 2916 wrote to memory of 2840 2916 cmd.exe 35 PID 2840 wrote to memory of 2852 2840 arq2.exe 36 PID 2840 wrote to memory of 2852 2840 arq2.exe 36 PID 2840 wrote to memory of 2852 2840 arq2.exe 36 PID 2840 wrote to memory of 2852 2840 arq2.exe 36 PID 2840 wrote to memory of 1184 2840 arq2.exe 21 PID 2840 wrote to memory of 2724 2840 arq2.exe 37 PID 2840 wrote to memory of 2724 2840 arq2.exe 37 PID 2840 wrote to memory of 2724 2840 arq2.exe 37 PID 2840 wrote to memory of 2724 2840 arq2.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38d50b3ef5a0403986c3bdbebdd94207_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start arq1.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\arq1.exearq1.exe4⤵
- Executes dropped EXE
PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start arq2.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\arq2.exearq2.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\EXPLORER.EXEEXPLORER.EXE5⤵PID:2852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\arq2.exe"5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5d086545408c8a9fe705ac367d6f2e551
SHA14e9df7d7cd71679937f0b186d6495db8964eacab
SHA256878843d0d31967fe610a127e1a3e131d699aae23babc3caac2ed202b129d78cd
SHA512164a2988c067afedccc7c35829894d0b3672023a230a4ffae8ec80891c054aa09f3f629de12b17b204f6f4a24366d4eb3f560052c29016f8cc2577e90bebb8ca
-
Filesize
51KB
MD5b101a6b64d8f1341a3c88b8d746a5998
SHA19121c811e4ccded2420d7b15e3e3efeef365cee3
SHA256453e9d696d04834c07d2639b7689b8bece4d41cfef91bcbd146eb4939cf62f38
SHA512db71f23191e51918725c416187c051264a429e4df855936a1f4785f247e039ddab3b7360dfc4852a999f3346cbf30bfe376cedb3eb6584c0e54d26d62aa8a3aa