Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe
-
Size
227KB
-
MD5
3fdbd3c0f5ec84cedd3dd6ae28272a6b
-
SHA1
35bd6e15e934d823aa88161305e0fd0b2b8246c7
-
SHA256
ffe8d0f6e580bab31998dab11574c92c7f74c2db53867b716c41ee27da361466
-
SHA512
5e9cea8ed7005b628c860f9459cbf476de5590586266985781dd5cb91e4e1a7aeb5f4873b33ff08946508f22c96e7d5fca6df17156fd6685b7aee264bd0609d2
-
SSDEEP
3072:F/uSnUuEgbB3cTlji/6GYCPo9A3SzijvW//qY5RQmrS3ri0bn:9bB3j/67CQ2+N/Cmp+3W0L
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3012 HelpMe.exe 2712 pathname.exe -
Loads dropped DLL 4 IoCs
pid Process 2700 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 2700 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 3012 HelpMe.exe 3012 HelpMe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pathname = "C:\\Windows\\system32\\pathname.exe" HelpMe.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\HelpMe.exe 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe File created C:\Windows\SysWOW64\pathname.exe HelpMe.exe File opened for modification C:\Windows\SysWOW64\pathname.exe HelpMe.exe File created C:\Windows\SysWOW64\pathname.exe pathname.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3012 2700 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 30 PID 2700 wrote to memory of 3012 2700 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 30 PID 2700 wrote to memory of 3012 2700 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 30 PID 2700 wrote to memory of 3012 2700 3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe 30 PID 3012 wrote to memory of 2712 3012 HelpMe.exe 31 PID 3012 wrote to memory of 2712 3012 HelpMe.exe 31 PID 3012 wrote to memory of 2712 3012 HelpMe.exe 31 PID 3012 wrote to memory of 2712 3012 HelpMe.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fdbd3c0f5ec84cedd3dd6ae28272a6b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\HelpMe.exeC:\Windows\system32\HelpMe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\pathname.exe"C:\Windows\system32\pathname.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD50c02e5b05b80bd1ecf038c4a0979a1d2
SHA151ad0c76c7b2b4cf82c256252b4a43bfb582cd7b
SHA2562568031ff9e4a14bd46210d98f6e599e1f918a331ff6a2e6c234b57728665676
SHA512febb63275a54d455548d64b37e98d9bae0e7ba4356561045af65acfded9058904c4ec2ce0bd1f9a5283415a806990087e772a22f4376b7b77ec18fd8f8cc707a