Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe
-
Size
76KB
-
MD5
46e39a5f32136bef752b128de0af54d7
-
SHA1
0e6fbf9f629e70feec9f149ddd48d4925c843e78
-
SHA256
ef0bfac8bd8acb943449d81d9505cabe0885094c4b387f1268e3c496006d78c7
-
SHA512
3c6809d1aec3ecbf7ee77bc8137b45812161869f057bc034395bd6d5173fd36874fd9c227207a4b3521c806e788b90f36d6a0ce055d83ab0d94f90a3e4d85583
-
SSDEEP
1536:t5IctgeInVw24Mu9kJxlJoCtghVlJOmcKuVTD1:t5Ictrcwiu9kJxlOBEx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 winNzbfP.exe -
Loads dropped DLL 4 IoCs
pid Process 2608 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 2608 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 2808 winNzbfP.exe 2808 winNzbfP.exe -
resource yara_rule behavioral1/files/0x000f000000013423-4.dat upx behavioral1/memory/2808-9-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2808-13-0x00000000002E0000-0x00000000002F8000-memory.dmp upx behavioral1/memory/2808-30-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\winNzbfP = "C:\\Windows\\system32\\winNzbfP.exe" 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\winNzbfP.exe 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SoftWare winNzbfP.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 winNzbfP.exe 2808 winNzbfP.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2808 2608 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 32 PID 2608 wrote to memory of 2808 2608 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 32 PID 2608 wrote to memory of 2808 2608 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 32 PID 2608 wrote to memory of 2808 2608 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\winNzbfP.exe"C:\Windows\System32\winNzbfP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD50aa29f812f9362a7aa0efcc6571a45c3
SHA17de2999d3527717376a75e5f2724610e401ff61f
SHA2562cde921c6a4a79a0767054699b284fdc0c09921945995b8f27021bf43933fa9f
SHA5129bcc759635c8034244180b6a916760e3dc9876aa308c8df50c693934f9966f26bb82af8bfa5476132706b8b776a5eaef701d67bc12d83a3cc9be70fe1d85ec89