Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe
-
Size
620KB
-
MD5
411fcde0244d47f1c12e35c03fcdcf9d
-
SHA1
7e56209cbdcfdcfba8c76f26007ea4e580acee2e
-
SHA256
27545699d7d71650d09043186c5039531c617b8c66a6e3dd8c9ba451933ce42d
-
SHA512
15fc53e5bfd586f4d7c84c0489f029ef05a2f2c48175bbfe5b4a7ab188c02b96a2b2416c68a58e5265f3fb31575482f22878a09c076f7bec487f339c05189827
-
SSDEEP
12288:l1X4clDdgZMwczTRO+G7VxxUHHWKHVxylzaJfyBeTe/z/JbQp:T7EZM3xIZOVSEJfyBa8TJ
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{654C5662-9F03-4CD9-970B-B5E66A4EC6BD} writer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{654C5662-9F03-4CD9-970B-B5E66A4EC6BD}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\writer.exe" writer.exe -
Executes dropped EXE 2 IoCs
pid Process 2180 writer.exe 2208 writer.exe -
Loads dropped DLL 2 IoCs
pid Process 1800 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 2180 writer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\writer = "C:\\Users\\Admin\\AppData\\Local\\writer.exe" writer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2416 set thread context of 1800 2416 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 28 PID 2180 set thread context of 2208 2180 writer.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1800 2416 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 28 PID 2416 wrote to memory of 1800 2416 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 28 PID 2416 wrote to memory of 1800 2416 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 28 PID 2416 wrote to memory of 1800 2416 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 28 PID 2416 wrote to memory of 1800 2416 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 28 PID 2416 wrote to memory of 1800 2416 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 28 PID 1800 wrote to memory of 2180 1800 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 29 PID 1800 wrote to memory of 2180 1800 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 29 PID 1800 wrote to memory of 2180 1800 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 29 PID 1800 wrote to memory of 2180 1800 411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2208 2180 writer.exe 30 PID 2180 wrote to memory of 2208 2180 writer.exe 30 PID 2180 wrote to memory of 2208 2180 writer.exe 30 PID 2180 wrote to memory of 2208 2180 writer.exe 30 PID 2180 wrote to memory of 2208 2180 writer.exe 30 PID 2180 wrote to memory of 2208 2180 writer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\411fcde0244d47f1c12e35c03fcdcf9d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\writer.exe"C:\Users\Admin\AppData\Local\writer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\writer.exe"C:\Users\Admin\AppData\Local\writer.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:2208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
620KB
MD5411fcde0244d47f1c12e35c03fcdcf9d
SHA17e56209cbdcfdcfba8c76f26007ea4e580acee2e
SHA25627545699d7d71650d09043186c5039531c617b8c66a6e3dd8c9ba451933ce42d
SHA51215fc53e5bfd586f4d7c84c0489f029ef05a2f2c48175bbfe5b4a7ab188c02b96a2b2416c68a58e5265f3fb31575482f22878a09c076f7bec487f339c05189827