Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe
-
Size
382KB
-
MD5
43399001a5d874ba3fa4c289d7033eed
-
SHA1
00739fb9255eb83ce78389e2cc97b3615a9b2ddb
-
SHA256
a6cbc79a7bc2e01e1a12b3bbbcd8b4e7b17e2a342ed26d01145b006c50a46484
-
SHA512
022aad4f2f05b697f568e2073616e2e3a0658ab8262ce4a07d725d60b72c3170492feedfea776bbfb3d395712172810f97c5728f5e129de9b2c1f0f2a8b23a36
-
SSDEEP
6144:oWayFWFkwByXkRLMaKmays74PQ4nvD/o1q11VqkscP/VfRMw/fUXCubtso0JU:H4+oyXhwnP1vD/o1UVqkntf+UYSJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1040 Server.exe 2888 caikong.exe -
Loads dropped DLL 2 IoCs
pid Process 2332 43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe 2332 43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\caikong.exe Server.exe File opened for modification C:\Windows\caikong.exe Server.exe File created C:\Windows\uninstal.bat Server.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1040 Server.exe Token: SeDebugPrivilege 2888 caikong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 caikong.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1040 2332 43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe 30 PID 2332 wrote to memory of 1040 2332 43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe 30 PID 2332 wrote to memory of 1040 2332 43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe 30 PID 2332 wrote to memory of 1040 2332 43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2844 2888 caikong.exe 32 PID 2888 wrote to memory of 2844 2888 caikong.exe 32 PID 2888 wrote to memory of 2844 2888 caikong.exe 32 PID 2888 wrote to memory of 2844 2888 caikong.exe 32 PID 1040 wrote to memory of 2880 1040 Server.exe 33 PID 1040 wrote to memory of 2880 1040 Server.exe 33 PID 1040 wrote to memory of 2880 1040 Server.exe 33 PID 1040 wrote to memory of 2880 1040 Server.exe 33 PID 1040 wrote to memory of 2880 1040 Server.exe 33 PID 1040 wrote to memory of 2880 1040 Server.exe 33 PID 1040 wrote to memory of 2880 1040 Server.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43399001a5d874ba3fa4c289d7033eed_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵PID:2880
-
-
-
C:\Windows\caikong.exeC:\Windows\caikong.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD569e01c599950b5caf5cd7ec972f89682
SHA12d34ceced77c1f86417c00f706e06cc902b11e3b
SHA256b46da5e666a34856e6f9763f5bef2a4879b4d33f42ea1727be44a84e76fc8e5e
SHA51248acf4f4b87eb21a255003a18ed572efb78d5c3ad90b4529bbb16dd32b53142c8f08fe4f567d29115e2ac1fb543f71c1b9ac3dc79cc14afda84c67f72ff11ba9
-
Filesize
743KB
MD5418e443e34b64656124e091670d0f9a3
SHA110660bffc4e0bdcfe7dee9bf2e9fe2c7da5831a6
SHA256263ca0aa7112f7a6ab418592644aaa5e8d7d489c0273b44a4a4ef863dce6ac76
SHA51228c5c935084ad1dea9ce478754bc1b0c9a1a747ebeb2964520fc49de506a28e23ee9352b2ec0c947a3472b25f47fd66df55f949e1b7999632a15c70879c7286f