Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 23:28
Static task
static1
Behavioral task
behavioral1
Sample
4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe
-
Size
17KB
-
MD5
4bdef79bc1f1709049f3f4e1aefa9d3a
-
SHA1
1f923501094b234ef59596adab187874f734e882
-
SHA256
160d68f65b5ab4690993398f63a3407d113f5ce70e35aee6a44e1b36b637047c
-
SHA512
30a210ba33ef4eb6bc32cb50d93d2b46376d90b0ff90cebfa00873721e6fe45efdc7f576af18e7c1d57d3032006d3e5ddc59df62fa9020fe19e1201c9a8e07c9
-
SSDEEP
384:Ny+26QIVmapXo0rridertW0w0PBVrivaa2zFAVhh:NLFQI/YirCkwGV2yFzFi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1652 utorrent.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat utorrent.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\utorrent.exe 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe File opened for modification C:\Windows\utorrent.exe 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings utorrent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ utorrent.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" utorrent.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" utorrent.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2408 2584 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe 30 PID 2584 wrote to memory of 2408 2584 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe 30 PID 2584 wrote to memory of 2408 2584 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe 30 PID 2584 wrote to memory of 2408 2584 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe 30 PID 2408 wrote to memory of 1724 2408 cmd.exe 32 PID 2408 wrote to memory of 1724 2408 cmd.exe 32 PID 2408 wrote to memory of 1724 2408 cmd.exe 32 PID 2408 wrote to memory of 1724 2408 cmd.exe 32 PID 1724 wrote to memory of 2860 1724 net.exe 34 PID 1724 wrote to memory of 2860 1724 net.exe 34 PID 1724 wrote to memory of 2860 1724 net.exe 34 PID 1724 wrote to memory of 2860 1724 net.exe 34 PID 1652 wrote to memory of 2480 1652 utorrent.exe 35 PID 1652 wrote to memory of 2480 1652 utorrent.exe 35 PID 1652 wrote to memory of 2480 1652 utorrent.exe 35 PID 1652 wrote to memory of 2480 1652 utorrent.exe 35 PID 2408 wrote to memory of 2256 2408 cmd.exe 37 PID 2408 wrote to memory of 2256 2408 cmd.exe 37 PID 2408 wrote to memory of 2256 2408 cmd.exe 37 PID 2408 wrote to memory of 2256 2408 cmd.exe 37 PID 2256 wrote to memory of 2812 2256 net.exe 38 PID 2256 wrote to memory of 2812 2256 net.exe 38 PID 2256 wrote to memory of 2812 2256 net.exe 38 PID 2256 wrote to memory of 2812 2256 net.exe 38 PID 2480 wrote to memory of 2888 2480 cmd.exe 39 PID 2480 wrote to memory of 2888 2480 cmd.exe 39 PID 2480 wrote to memory of 2888 2480 cmd.exe 39 PID 2480 wrote to memory of 2888 2480 cmd.exe 39 PID 2888 wrote to memory of 2992 2888 net.exe 40 PID 2888 wrote to memory of 2992 2888 net.exe 40 PID 2888 wrote to memory of 2992 2888 net.exe 40 PID 2888 wrote to memory of 2992 2888 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\a.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:2860
-
-
-
C:\Windows\SysWOW64\net.exenet stop winvnc43⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winvnc44⤵PID:2812
-
-
-
-
C:\Windows\utorrent.exe"C:\Windows\utorrent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\a.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:2992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD54bdef79bc1f1709049f3f4e1aefa9d3a
SHA11f923501094b234ef59596adab187874f734e882
SHA256160d68f65b5ab4690993398f63a3407d113f5ce70e35aee6a44e1b36b637047c
SHA51230a210ba33ef4eb6bc32cb50d93d2b46376d90b0ff90cebfa00873721e6fe45efdc7f576af18e7c1d57d3032006d3e5ddc59df62fa9020fe19e1201c9a8e07c9
-
Filesize
71B
MD54db2c561024318efaf926a8e0a6ebc36
SHA18e3060152b239e7c7bc488e79030b9e3c13de066
SHA256f9ea85780a059d9338c359925ec487588102ef55be4062ec4ac19efc8af59f0f
SHA512df700bc9348e147ceb1db687974c567fdff052d73eb4709b718f3b3dfaf44116a5a70c0ae62438416888c0783a575e524f501da1308bbc987443ec3c852bef99