Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 08:34
Behavioral task
behavioral1
Sample
3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe
-
Size
948KB
-
MD5
3cab479097d53b97231bc3af9048faea
-
SHA1
09835c19d6cbd6c7d72c75733d4549a49c7dfe3b
-
SHA256
44ef51299276e3ebd25cdb7f7373a0a80d6196f0ff2e4d37ae08fbe8b4bacee0
-
SHA512
e2a6ac969d20adb545df6f18d7f7114883976c292010e1246373841d22232fb663770ad732de81666f8110ef81aa1a00e2afeb7584fc517fe37b2c0e5cb2ba46
-
SSDEEP
24576:pJ1cvsvm+SPguSEuzmfKCK6dGdFcIm5iPY:Ql4uSEmHWdGdFJqaY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 519177.exe -
Loads dropped DLL 3 IoCs
pid Process 2860 cmd.exe 2856 519177.exe 2856 519177.exe -
resource yara_rule behavioral1/files/0x000a00000001202e-27.dat upx behavioral1/memory/2856-24-0x0000000001000000-0x0000000001583000-memory.dmp upx behavioral1/memory/2860-23-0x0000000002850000-0x0000000002DD3000-memory.dmp upx behavioral1/memory/2260-2-0x0000000001000000-0x0000000001583000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\3cab479097d53b97231bc3af9048faea_JaffaCakes118 = "\"C:\\Users\\Admin\\AppData\\Local\\519177.exe\" 0 28 " 3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\519177 = "\"C:\\Users\\Admin\\AppData\\Local\\519177.exe\" 0 35 " 519177.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2484 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2856 519177.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe 2856 519177.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2860 2260 3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe 30 PID 2260 wrote to memory of 2860 2260 3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe 30 PID 2260 wrote to memory of 2860 2260 3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe 30 PID 2260 wrote to memory of 2860 2260 3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2484 2860 cmd.exe 32 PID 2860 wrote to memory of 2484 2860 cmd.exe 32 PID 2860 wrote to memory of 2484 2860 cmd.exe 32 PID 2860 wrote to memory of 2484 2860 cmd.exe 32 PID 2860 wrote to memory of 2856 2860 cmd.exe 33 PID 2860 wrote to memory of 2856 2860 cmd.exe 33 PID 2860 wrote to memory of 2856 2860 cmd.exe 33 PID 2860 wrote to memory of 2856 2860 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3cab479097d53b97231bc3af9048faea_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\66049007.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 3cab479097d53b97231bc3af9048faea_JaffaCakes118 /f3⤵
- Modifies registry key
PID:2484
-
-
C:\Users\Admin\AppData\Local\519177.exeC:\Users\Admin\AppData\Local\519177.exe -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438B
MD560272293eadd601a38ccea3112079f03
SHA1050a7dca0282d42d758c58637436268182da7f87
SHA256425328486a5aba4ae3f03ad47cf71fb2bfcbf2c26c0ea4f228f9c5416d54a7f0
SHA512b861d462c24c99fa470dcf199a15e3ab06dbf4dd0b98870e098887d26aa8ce1b93408dfeab87ae99464654c7e417dd99841db68e43f41a8160a961a7fe956a3b
-
Filesize
948KB
MD53cab479097d53b97231bc3af9048faea
SHA109835c19d6cbd6c7d72c75733d4549a49c7dfe3b
SHA25644ef51299276e3ebd25cdb7f7373a0a80d6196f0ff2e4d37ae08fbe8b4bacee0
SHA512e2a6ac969d20adb545df6f18d7f7114883976c292010e1246373841d22232fb663770ad732de81666f8110ef81aa1a00e2afeb7584fc517fe37b2c0e5cb2ba46