Analysis
-
max time kernel
140s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 20:59
Behavioral task
behavioral1
Sample
43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe
-
Size
16KB
-
MD5
43512d49d8a967205cef97f26d95f99a
-
SHA1
76f5463ebfd1175217a54681dd925376e52ac0c0
-
SHA256
2a848c7c9cf48235b44fdbfd892d8adc81585264c62b8d5af96f2f6d8dc21b66
-
SHA512
3bbc60241f96adb8dcc4386329738ff82b2bd542b67bb61b1d2ff1d8d0ff748ea3c7f4a37fa19d76e7bfce52f3e914120168938eb3d5e188b80635adec2e6a22
-
SSDEEP
384:/TWDcJwS745tGrRwcRwuglum7uk1F2Uw3Ekby:/EcJF852wbulk1MJ3Ekb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4712-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x00090000000234d7-7.dat upx behavioral2/memory/4712-21-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\*P-Monkey = "c:\\WINDOWS\\monkey.com" 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\*P-Monkey = "c:\\windows\\system\\slurpee.scr" 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MP3 Player = "c:\\windows\\cdplayer.exe" 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\U: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\V: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\M: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\N: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\J: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\R: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\T: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\W: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\H: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\I: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\K: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\P: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\B: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\G: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\L: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\O: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\Q: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\X: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\Y: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\Z: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\A: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened (read-only) \??\E: 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created \??\c:\windows\boot.dll 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File created \??\c:\WINDOWS\monkey.com 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened for modification \??\c:\WINDOWS\monkey.com 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File created \??\c:\windows\system\slurpee.scr 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened for modification \??\c:\windows\system\slurpee.scr 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File created \??\c:\windows\cdplayer.exe 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File opened for modification \??\c:\windows\cdplayer.exe 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File created \??\c:\windows\command\format.com 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe File created C:\windows\startm~1\programs\startup\monkey.scr 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4712 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4712 wrote to memory of 1196 4712 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe 86 PID 4712 wrote to memory of 1196 4712 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe 86 PID 4712 wrote to memory of 1196 4712 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe 86 PID 4712 wrote to memory of 4700 4712 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe 88 PID 4712 wrote to memory of 4700 4712 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe 88 PID 4712 wrote to memory of 4700 4712 43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe 88 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4700 attrib.exe 1196 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43512d49d8a967205cef97f26d95f99a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\attrib.exeattrib -h -r -s c:\autoexec.bat2⤵
- Views/modifies file attributes
PID:1196
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h -r -s c:\_restore2⤵
- Views/modifies file attributes
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD543512d49d8a967205cef97f26d95f99a
SHA176f5463ebfd1175217a54681dd925376e52ac0c0
SHA2562a848c7c9cf48235b44fdbfd892d8adc81585264c62b8d5af96f2f6d8dc21b66
SHA5123bbc60241f96adb8dcc4386329738ff82b2bd542b67bb61b1d2ff1d8d0ff748ea3c7f4a37fa19d76e7bfce52f3e914120168938eb3d5e188b80635adec2e6a22
-
Filesize
216B
MD56cfa126dd6a37a440886e3ebaf890861
SHA13bf62ab034048afa02a08f9af8139c0f4fa7de0e
SHA256bc72e722fa6f819ccbb28c23c4ebf10af95257389ffd808d2c093c8caa04990a
SHA512f81ea5ff0e44c19a84333d716b6ffb1e55e11ec8a12b6217fa513e126f7502bb8a9e76c5c72dff6ad2c973475726073297aedab1fd76807e7d03b010e07edcdc