Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 04:30
Behavioral task
behavioral1
Sample
444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe
-
Size
441KB
-
MD5
444fcde06c51da930c899f1ee9f17ba9
-
SHA1
4d6a9c0bb3376b8f4bbca11682aed3de1ae18339
-
SHA256
769e06d1d967348cd3dcb86cd0742ec420493158af8af82a0be516f9be83070b
-
SHA512
ad09985684357ecef89e9de248557c9ca389a71b2b8519d286656d7d528f449c472e16875d4b82cd6cf9d6dfd9830cbb6950c8fe7e6535b946870acae4a9f292
-
SSDEEP
6144:fPDnxPTlkTaZSgcGAVmFXxKW281uJrbufQHISpM+9IdUvzC+Uu+Rt4:fPDtEaZ4xVKMdIYlxph9CRt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2396 Uzizoa.exe -
resource yara_rule behavioral1/memory/2536-0-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/files/0x0007000000016d9c-11.dat upx behavioral1/memory/2396-12-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\CL2GFOKBC9 = "C:\\Windows\\Uzizoa.exe" Uzizoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe File created C:\Windows\Uzizoa.exe 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe File opened for modification C:\Windows\Uzizoa.exe 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main Uzizoa.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe 2396 Uzizoa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 2396 Uzizoa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2396 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2396 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2396 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2396 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2396 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2396 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2396 2536 444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\444fcde06c51da930c899f1ee9f17ba9_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Uzizoa.exeC:\Windows\Uzizoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD5d3b9b27fb62443afc39febbad5197bca
SHA1a97693e3df7525beedf552cd92436d8dbbb4bfc7
SHA256dc151e8bf132a056cf3ed282825f136d6060c399d97fdf87d47ddb7f25acec07
SHA512a766cfe907a0df6756cc11b0ae1236d4b2bb93270e0e870c754e169c2f5e799d9f2502a577eeaf99ca28d20e8440bde7f3bcae6188b3d2a362916c591fe7829d
-
Filesize
441KB
MD5444fcde06c51da930c899f1ee9f17ba9
SHA14d6a9c0bb3376b8f4bbca11682aed3de1ae18339
SHA256769e06d1d967348cd3dcb86cd0742ec420493158af8af82a0be516f9be83070b
SHA512ad09985684357ecef89e9de248557c9ca389a71b2b8519d286656d7d528f449c472e16875d4b82cd6cf9d6dfd9830cbb6950c8fe7e6535b946870acae4a9f292