Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
3ed71051cbfd41e21a43ea4234df9100
-
SHA1
d95e51dadd719b42a452a2e0c4f4c35e53cf7498
-
SHA256
58745d7ff96e25a6a1ce60b5dcdf33044dc8b757f110ec661de57e151cf4df1f
-
SHA512
e4076792222c205f3d2b2a2dc7debb9b6d1c90bb5cdab492081d28b7fc16d2c7c157c8f6e3b8421993dc9ea6f3a4b78c8bf422eee0548cbc7fd5b98fbaaa9185
-
SSDEEP
98304:pR9wnNIQf+uC8glhVqR5VBdIB/ont6biKUjM1z:ptjuC8glhMR5VBOZOtc0Qz
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3936 afile.exe 3216 aafile.exe 1832 afile.exe 2432 afile.tmp -
Loads dropped DLL 1 IoCs
pid Process 2432 afile.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" aafile.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3936 afile.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3936 2612 3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe 83 PID 2612 wrote to memory of 3936 2612 3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe 83 PID 2612 wrote to memory of 3936 2612 3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe 83 PID 2612 wrote to memory of 3216 2612 3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe 87 PID 2612 wrote to memory of 3216 2612 3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe 87 PID 2612 wrote to memory of 3216 2612 3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe 87 PID 3216 wrote to memory of 1832 3216 aafile.exe 88 PID 3216 wrote to memory of 1832 3216 aafile.exe 88 PID 3216 wrote to memory of 1832 3216 aafile.exe 88 PID 1832 wrote to memory of 2432 1832 afile.exe 89 PID 1832 wrote to memory of 2432 1832 afile.exe 89 PID 1832 wrote to memory of 2432 1832 afile.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ed71051cbfd41e21a43ea4234df9100_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\afile.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\afile.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aafile.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\aafile.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\afile.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\afile.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\is-A523G.tmp\afile.tmp"C:\Users\Admin\AppData\Local\Temp\is-A523G.tmp\afile.tmp" /SL5="$602BA,4218149,94720,C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\afile.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD505bddc1d44d042e06b204bf0de1fe0c8
SHA1e1d025b626b8500f8b3d8c526dc03e225dc11eac
SHA25668a78e20a82e034102836fe6838ee01171d42df935072effdf6c8427ecd969af
SHA512ac1a905cf69515a8b5613f68da2977bd944a6fe8d14c56994437aa441e4698b97fd3851c9f700abfab58c6b5ff0276cc9919fa15ed4113a8b09fe222d883e3cd
-
Filesize
104KB
MD584583d1809bde4583e625fe9cbf91416
SHA10ae448bd046e80d950ee713a9b9c9363bc764f12
SHA25637d22099938bf6b6bdeb1d1f4af0b0ae3d844aebc0373de86d914f47231a812b
SHA512d2d3b7e475561640d6b6f0a936500919dd204c3429c3caf0efa60892b053cd2c12b645d474b58f6e3991f89decb89e5d67cc4f2f931ad89ad39269a92b84b3c0
-
Filesize
4.3MB
MD55b1076c209af2d9640d8ea3e719b1769
SHA1a2bc01ed8b0f22499eefa7d158df2ad1e2c20808
SHA2561384631fa5f964c72c95e42ed2d690a6490c885e6e4518d1f2027078503cdd3d
SHA5126651bfb53953d2490f5cf484f4faf2ea583db31469221486d6b3fefc64dcdb67c281ccf3b0c3e091321292bd67127d3ea8d2ccd7cf5a1318e56e55265c24439e
-
Filesize
709KB
MD51f4cc78050eee45582b1f02d2f937c06
SHA17b43a66c9affbc7cffcb8d5018f240ae04cbaf0b
SHA256d75de1f821cc50f01efde7eac5a5afe1eab6fb1c79a3aae4d4ba5bb23e2484a4
SHA512d85fe1d93d60e4f63a29a77fbdd0afadcecf31de74c78ecd20969924758348c884780e3e1e44390f1c0d99b2cc54652cb2e6f506402cd57473b546dcdfe429fa
-
Filesize
48KB
MD584054ebeafecdca05340d48437cba1c0
SHA1b1ddf37c82868fbb8d933b59d56bb6798e015518
SHA256831ea946c4bfb41b8be4ec79100a2ab51e7ea8826741c38ea5f182e2b9fdc169
SHA5125c9f96b726f8446293b06b3392f4114c020de22947bbf70749b898938f1e998464df8f22439f3077774d574c155410de4a644068924b2e8dcc133536dd877486