Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe
-
Size
619KB
-
MD5
439dae0749ce55ef71be2c4679787916
-
SHA1
2b3f24286d2a7fbd7f7e5a775cac2efc477d4c74
-
SHA256
a716c18e700fcafae57d95963f9d623513b4e265bca3253762eec368f4f039ac
-
SHA512
cf1647a0d661543e73dca2526aa06bd705edeb0f0f7ada22c586d20a1a4ccb026b57bfb2715f30720460dc264caf5b94e1589335203ef9a0d6898b87b3bb5845
-
SSDEEP
12288:PafAtgyVMkgDA8DtP7OTT/l4Mq3xE41c2obY79g+hD6HFat8CJS:PBtTVMk2Dt+l4NCqocmm8Cc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3172 4VMP~1.EXE 3584 Hacker.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 4VMP~1.EXE File opened for modification C:\Windows\Hacker.com.cn.exe 4VMP~1.EXE File created C:\Windows\uninstal.bat 4VMP~1.EXE -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3172 4VMP~1.EXE Token: SeDebugPrivilege 3584 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3584 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4252 wrote to memory of 3172 4252 439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe 83 PID 4252 wrote to memory of 3172 4252 439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe 83 PID 4252 wrote to memory of 3172 4252 439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe 83 PID 3584 wrote to memory of 4712 3584 Hacker.com.cn.exe 88 PID 3584 wrote to memory of 4712 3584 Hacker.com.cn.exe 88 PID 3172 wrote to memory of 4512 3172 4VMP~1.EXE 89 PID 3172 wrote to memory of 4512 3172 4VMP~1.EXE 89 PID 3172 wrote to memory of 4512 3172 4VMP~1.EXE 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\439dae0749ce55ef71be2c4679787916_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4VMP~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4VMP~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:4512
-
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD5a8a35a6cd0b8d4f67b1fa46197cb178b
SHA1c6b3514909c4a81effffdb1dfb931030a5f9e1a0
SHA2567316de6a8ac1b44ec2543e8bd7b65c7fbaf958596d953da5eaa447bc8a97f079
SHA5126d47fce60cf1726828a62f69100f945c4d1929cb810939266726c636220dfd962070242c66b6bcade06371adad3f8ec475b5963086865ae54cdb3dc8348da407
-
Filesize
160B
MD564d11e7e4dee01a70b8179f77e58c444
SHA12b4c04bc3e011fbef9be4a73a40f655bb1a73c63
SHA25637bcb03dbe8bc1a482820a16c56496e1a3ea255557f00650e1610605a8336a64
SHA5125bcd5dc010834f11d0ee849eae3a786e0a3978fea216a4a5f284d8512784c683e0756e9f69c29a9409aa0a61ffdbd852d1f35036c343fbc82e1b87c9884e602e