Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe
-
Size
701KB
-
MD5
4609d7759abc6d588b1fad892b639116
-
SHA1
895f3221235bcc67f91a0a409a481b7df1ba97af
-
SHA256
4208ab37975cf95052264065123fc30bd155b05e20f44ae73a228ca36321a826
-
SHA512
a1d9b8b6ce70145651be667f78f95057fd71d2ecdbc06a77a830d933061a4275d7f7584b8872382a2eb2493ed90796298abb013005694b80d7caabc2a0daceb2
-
SSDEEP
12288:HxtCYdeMJ4914fTTbi11RG5pmZF3Z4mxx9vCoJ39Itq:HxtCWb4/4+1bGiZQmXEE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1124 4.exe -
Loads dropped DLL 6 IoCs
pid Process 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 1124 4.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2316 1124 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1124 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 31 PID 2468 wrote to memory of 1124 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 31 PID 2468 wrote to memory of 1124 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 31 PID 2468 wrote to memory of 1124 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 31 PID 2468 wrote to memory of 1124 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 31 PID 2468 wrote to memory of 1124 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 31 PID 2468 wrote to memory of 1124 2468 4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe 31 PID 1124 wrote to memory of 2316 1124 4.exe 32 PID 1124 wrote to memory of 2316 1124 4.exe 32 PID 1124 wrote to memory of 2316 1124 4.exe 32 PID 1124 wrote to memory of 2316 1124 4.exe 32 PID 1124 wrote to memory of 2316 1124 4.exe 32 PID 1124 wrote to memory of 2316 1124 4.exe 32 PID 1124 wrote to memory of 2316 1124 4.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4609d7759abc6d588b1fad892b639116_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 2643⤵
- Loads dropped DLL
- Program crash
PID:2316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343KB
MD543d5a9beb50d7d3bd18f034286bef32a
SHA1c54fb82985fe44843fc5ef2f8cf1595be0a34649
SHA2565adf6f7748c62a7e5212aefa562ef7ecf603b6d20261b798aad709e74a7c2a7c
SHA512148eae08033b94e65badb3742bb72b79f5a8d8f0ffda58726ffe6755a19878be159afee50171a7c59952cf592dad2b5928dd2bce40d937ce323b30dc5d65558d