Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe
-
Size
9KB
-
MD5
3941108bc21b6b7568b058ad3a00026d
-
SHA1
fd1729d9bf72d8a6cff97d9f5ce35da53d9de6b4
-
SHA256
534b2f21a17b6710422eddfb78d11e07c99abe086af0895d694869c1ca24b000
-
SHA512
d47c9f77c7ff857f6d608606162a97cc46ad26724239feb334f61d1a8ffdd150f0b8b46a3f304daea905b2efbbecfb50837a402fb6691a2716e0cd00fdc0c7e4
-
SSDEEP
192:YCoui32kFeiIve13FHiZbLZD/V6fvx8x/otVHh7aa:0ui32FiI2tFCbzIXOx/67j
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\midimaptl = "{4F4F0064-71E0-4f0d-0017-708476C7815F}" 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\midimaptl.tmp 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\midimaptl.tmp 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\midimaptl.dat 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F} 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F}\InProcServer32 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F}\InProcServer32\ = "C:\\Windows\\SysWow64\\midimaptl.dll" 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4F4F0064-71E0-4f0d-0017-708476C7815F}\InProcServer32\ThreadingModel = "Apartment" 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2160 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2160 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2916 2160 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2916 2160 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2916 2160 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2916 2160 3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3941108bc21b6b7568b058ad3a00026d_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1CD4.tmp.bat2⤵
- Deletes itself
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5682701616b98132e7694cfdf1470ad61
SHA17c0d41fc5c1190d6e9e52b82da006a3b930616f7
SHA25657754eb2ace60dbbec4f5e7a8e928769c1e1241d5dbb6083d14bd334b71423c1
SHA51285b3b34ef91f95dec22fe6ccb94a1c3d5497306127928492a74ce565422e455b3e01c323d7eff5a85d6d5c52f8bdbb233c1515071bc78cf9ddf51d1d8307a660
-
Filesize
20KB
MD59f0863a5ce140e40feb250e6677f001c
SHA147ac82dbefd05deb18164c0ace329af56a9d1c53
SHA256f05052bcd7aaf44520c03548708c323c43be9bf4bf08f2ff262881950c625893
SHA512cc9a8a9d29cd90a7b03cb6362a569d617a626c03c58f6301807c0401a7dd6e1c61ed12063036440bd47291af3fd80ad0726a1082793b85134f9257c5cd03a977