Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe
-
Size
156KB
-
MD5
3d019860623687acd2bcbbbca8f7e675
-
SHA1
5a535c1d1b6aab212da61ccf667a5cf5539ff767
-
SHA256
d39f788c2ca30200f3f95ef16b2827c0f941d43c2682c4d502708e0ff9bbf4c9
-
SHA512
731767dc5feb2aba2b39980f0e07a227fc5ca84f43c009cc11a291768649bb5babb0ad4a839c5088b95762572ab2bb8dc11e891189272f8fe2a6174ee2568f6b
-
SSDEEP
3072:eJyj32Mg8Z6eijNep4CdmBuMs88l+oOFdI5n+Q66ZiMItdxgghFvdZwQ11s:B2ApiEDmIh88coqy5+QNZiP2ghFVZwQU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2724 Ptepaa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe File created C:\Windows\Ptepaa.exe 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe File opened for modification C:\Windows\Ptepaa.exe 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ptepaa.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Ptepaa.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Ptepaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Internet Explorer\Main Ptepaa.exe Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Internet Explorer\International Ptepaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe 2724 Ptepaa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3068 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe 2724 Ptepaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2724 3068 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe 86 PID 3068 wrote to memory of 2724 3068 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe 86 PID 3068 wrote to memory of 2724 3068 3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d019860623687acd2bcbbbca8f7e675_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Ptepaa.exeC:\Windows\Ptepaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD53d019860623687acd2bcbbbca8f7e675
SHA15a535c1d1b6aab212da61ccf667a5cf5539ff767
SHA256d39f788c2ca30200f3f95ef16b2827c0f941d43c2682c4d502708e0ff9bbf4c9
SHA512731767dc5feb2aba2b39980f0e07a227fc5ca84f43c009cc11a291768649bb5babb0ad4a839c5088b95762572ab2bb8dc11e891189272f8fe2a6174ee2568f6b
-
Filesize
390B
MD5aba33745d1122803b66dcebde71c5c9d
SHA1f3840eb9bc9b89e66c72aaf9b6b5e0f9cabb3005
SHA256e081dd4f72e65af4f902c06437579d01f8d6c0e4a274968322c64e89378c7e3e
SHA512aa6033ea06e061bd35ffb8991d2c08b2a3719c65471569a145a4630259e5afbab46bc93e4e5d45270503ea3f556e365de880c5ea95d5f3985608dff85b2823b8