Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 20:39
Behavioral task
behavioral1
Sample
3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe
-
Size
496KB
-
MD5
3aa351387b53449aba8d58f8e7e41e61
-
SHA1
bbc04810199e233e0ee02c402e4af0771e89ff9e
-
SHA256
08c612b8bb61157ca05e3082389952286e19174ae0192a9d79b248d50bbcc146
-
SHA512
d42de8651536bda7f0e034a7435d3a9eb254ffa7341b7fc8e7eda886e6962dcc9b6909e9748f9d8ecd3e68b01c8e4a4fdbcca7f7d59c640d51e10e27ade2e119
-
SSDEEP
6144:WkPlSwSmzEnqjDWrzF/zUc7AeY6EJsObtbHxcLXnJELlZfzuNdKr+Q0:UzUgcFswbRoXnS6M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1568 Urimaa.exe -
resource yara_rule behavioral1/memory/2984-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral1/files/0x0004000000004ed7-11.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe File created C:\Windows\Urimaa.exe 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe File opened for modification C:\Windows\Urimaa.exe 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Urimaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Urimaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main Urimaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe 1568 Urimaa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2984 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe 1568 Urimaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1568 2984 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe 31 PID 2984 wrote to memory of 1568 2984 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe 31 PID 2984 wrote to memory of 1568 2984 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe 31 PID 2984 wrote to memory of 1568 2984 3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3aa351387b53449aba8d58f8e7e41e61_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\Urimaa.exeC:\Windows\Urimaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD50faa9015f722e2ba6b677340aacbab03
SHA18b254da402013840cf799e96b78bc80fe76c16b2
SHA256eeb9e914f59367c1e41db3cb5e1f3d38c7e06e679859ae1b36c66dbbc51e5d0c
SHA512250b0a1a19b1e0066ff569afecb949a9ee27f15c99f67c70bd7606af164d5f3be511c2c9189226f4977ca66853410c0b14cc6341b4682f5b3ee38e8c143cab57
-
Filesize
496KB
MD53aa351387b53449aba8d58f8e7e41e61
SHA1bbc04810199e233e0ee02c402e4af0771e89ff9e
SHA25608c612b8bb61157ca05e3082389952286e19174ae0192a9d79b248d50bbcc146
SHA512d42de8651536bda7f0e034a7435d3a9eb254ffa7341b7fc8e7eda886e6962dcc9b6909e9748f9d8ecd3e68b01c8e4a4fdbcca7f7d59c640d51e10e27ade2e119