Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe
-
Size
259KB
-
MD5
38f151b5164d18158be1d6e3493a897d
-
SHA1
b3dd8da39983db5e8f582e1715e36b80eb51aaba
-
SHA256
516935769ce832ae4e31e38ae0764009f90b55208710b29987f9289bd4fafc3d
-
SHA512
94b73294bb46c4ecfd2ca32a27885c9f5ac99cfc7bce758e89d1dc7719c7dccaeef9558f96c94bfa734d603266397fa202e6f5a56401e1c497f9ce4a59fe3131
-
SSDEEP
6144:S16bnUWDUqJDdfMixNz9z+LS0X8W3Yp/UTxNbt0O4xy4qjqYq4lH:S16bULqFdEixN0j6/Oh0nxBgqYPH
Malware Config
Signatures
-
Event Triggered Execution: AppCert DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2728 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1144 Explorer.EXE -
Loads dropped DLL 6 IoCs
pid Process 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2728 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\chardkey.dll 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe File created C:\Windows\system32\chardkey64.dll 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" Explorer.EXE -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" Explorer.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2208 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 31 PID 1640 wrote to memory of 2208 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 31 PID 1640 wrote to memory of 2208 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 31 PID 1640 wrote to memory of 2208 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 31 PID 1640 wrote to memory of 2728 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 32 PID 1640 wrote to memory of 2728 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 32 PID 1640 wrote to memory of 2728 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 32 PID 1640 wrote to memory of 2728 1640 38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe 32 PID 2728 wrote to memory of 2912 2728 cmd.exe 34 PID 2728 wrote to memory of 2912 2728 cmd.exe 34 PID 2728 wrote to memory of 2912 2728 cmd.exe 34 PID 2728 wrote to memory of 2912 2728 cmd.exe 34 PID 2208 wrote to memory of 1144 2208 rundll32.exe 20 PID 2208 wrote to memory of 1144 2208 rundll32.exe 20 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2912 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\chardkey64.dll",CreateProcessNotify3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259460472.bat" "C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe""3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h"C:\Users\Admin\AppData\Local\Temp\38f151b5164d18158be1d6e3493a897d_JaffaCakes118.exe"4⤵
- Views/modifies file attributes
PID:2912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5d226a657b279c5fc0a892748230a56ff
SHA1fa7e4fb6d6de3c4769001cbfce0a00ba02ef28a5
SHA2569dae2767b8e3499d37418a75ddd04d457c7ec8d6c8f312ee109c95a8a97e7761
SHA51207d55ccf3b511c3be64f6dcd05cea3feaafb286196e5d7ba30016ab6d9c0d656fb7cde8eb1ce0ef28a41f1f3f00f0e29020c92479619fd43e4ed47b829f8bf2a
-
Filesize
97KB
MD5d3794ac0ee31e37e43a0f603051fe600
SHA1e4967d81ee19f2b947e7808031cb356a80248534
SHA256d183d2922fce4964f86c352f276241d2b4be1330c12b25491b6c668ff0c10989
SHA512c34725feb906ad23f96f1e12499df8c119707509d17b745f8f9ba6755c9caab82f1aee47048987dfd1b35c3337ddb63acb02cfe551797069b28ac3ccc9870551
-
Filesize
88KB
MD5bbf62c6be49d997b450c940afb342de4
SHA1368d62826a0c24c60df60f4fa2a8ee29f5bce85b
SHA256f16332e20ace5a4610cb9ee1ca0fcea41bcbf6136224ba7fafc6d1d7d4fffd6d
SHA512745e718abfe25469436a30f12de77c65cec5f79d6552d98409d40f097130d1c3818f435200c6d34e46191e8fc687f42240d11b29bffbaf38a11cb5468d51f2f3