Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe
-
Size
128KB
-
MD5
430ad1e462cb3e206a304cf97dda76e6
-
SHA1
b075764d918c9f3d8b9976ae45f6398a7a7706fc
-
SHA256
87bf96d02e831c8f1e2b913d101f90611953dc3eb2fde89cd10fd729b483545b
-
SHA512
9202b1fa44fc2cb306a970059d9d10d39e751062d71accbef2483379e2cb09db5df2da3dab9014d21165b73855aff9f99ea333e00400ccd3023233b2cb4fce33
-
SSDEEP
3072:e1xo4M5CZwYnobhfQp8HTWxD3y4CpCfCGCCOCwC9CvCFCfCLCvCUCLC2FInROUSp:Jg3yGFInRO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rjqin.exe -
Executes dropped EXE 1 IoCs
pid Process 2628 rjqin.exe -
Loads dropped DLL 2 IoCs
pid Process 2512 430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe 2512 430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\rjqin = "C:\\Users\\Admin\\rjqin.exe" rjqin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe 2628 rjqin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2512 430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe 2628 rjqin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2628 2512 430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2628 2512 430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2628 2512 430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2628 2512 430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe 30 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29 PID 2628 wrote to memory of 2512 2628 rjqin.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\430ad1e462cb3e206a304cf97dda76e6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\rjqin.exe"C:\Users\Admin\rjqin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5693db142839f42c6a2831e2e18846e8a
SHA19d7a96887fe469276238406341b073101c8ece21
SHA256b64d31c50f19c4af372c5579c716799c78a953e714fceaa605a1b4dfaf303067
SHA512d024af0f3d5d177312283abd3bb98a822a07ac7d8359ca3377aa4459795532b4f6bca1f786ac11aaac0b51701180f07f0d0fece49ee6a8dabbe772e303faaed9