Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
-
Size
964KB
-
MD5
49b3a9235f8f6ba42f23639245e24def
-
SHA1
ca3ae9dba6fed3202a5c9dd5a6483dacaa0e5dbc
-
SHA256
af8f1a41acf398ca367f1b4813f44cac040f442afa5a985f42a514aeb6b238ac
-
SHA512
aad5e1872ec7c924b80550ffece18502657db56f154e9fac5bb4e0e97aa5e59d850d5c2a41e1e352fee976647868ee2c3619c48d61ef99553b237719812a36ae
-
SSDEEP
24576:+ER3WHqaSd5V5nUUfy/OdszZ11IwrZQmXMVTzLR:BRmZSd5oh/Od6Z11Cm8r
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2196 SCRAMB~1.EXE 2728 SCRAMB~1.EXE 2692 iexplore.exe 2784 iexplore.exe -
Loads dropped DLL 4 IoCs
pid Process 2028 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 2028 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 2196 SCRAMB~1.EXE 2692 iexplore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2196 set thread context of 2728 2196 SCRAMB~1.EXE 30 PID 2692 set thread context of 2784 2692 iexplore.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\debug\iexplore.exe SCRAMB~1.EXE File opened for modification C:\Windows\debug\iexplore.exe SCRAMB~1.EXE File created C:\Windows\Delete.bat SCRAMB~1.EXE -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\System iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2196 2028 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 29 PID 2028 wrote to memory of 2196 2028 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 29 PID 2028 wrote to memory of 2196 2028 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 29 PID 2028 wrote to memory of 2196 2028 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2728 2196 SCRAMB~1.EXE 30 PID 2196 wrote to memory of 2728 2196 SCRAMB~1.EXE 30 PID 2196 wrote to memory of 2728 2196 SCRAMB~1.EXE 30 PID 2196 wrote to memory of 2728 2196 SCRAMB~1.EXE 30 PID 2196 wrote to memory of 2728 2196 SCRAMB~1.EXE 30 PID 2196 wrote to memory of 2728 2196 SCRAMB~1.EXE 30 PID 2692 wrote to memory of 2784 2692 iexplore.exe 32 PID 2692 wrote to memory of 2784 2692 iexplore.exe 32 PID 2692 wrote to memory of 2784 2692 iexplore.exe 32 PID 2692 wrote to memory of 2784 2692 iexplore.exe 32 PID 2692 wrote to memory of 2784 2692 iexplore.exe 32 PID 2692 wrote to memory of 2784 2692 iexplore.exe 32 PID 2728 wrote to memory of 2536 2728 SCRAMB~1.EXE 33 PID 2728 wrote to memory of 2536 2728 SCRAMB~1.EXE 33 PID 2728 wrote to memory of 2536 2728 SCRAMB~1.EXE 33 PID 2728 wrote to memory of 2536 2728 SCRAMB~1.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat4⤵PID:2536
-
-
-
-
C:\Windows\debug\iexplore.exeC:\Windows\debug\iexplore.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\debug\iexplore.exeC:\Windows\debug\iexplore.exe2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:2784
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c1⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5986b83f89e84a61179e9a199bf0533eb
SHA1f9af4d9e5efea970a5b02a14c9be533aadb7d07d
SHA25680b9e3d48eea89c021ac38a6a8bcb1381a318e50c152e3c7d4a4f89eb6483b7e
SHA512890c6703e92541ec77b0a8c7c5767f08928dccfc962dc45a31463e8d01d6bef56730d9898acff80065321bf3b45fc480186ea402e5ade8541dd2795214076746
-
Filesize
1.0MB
MD525ce0814bb31d1a43a3f75f4e61f81d5
SHA17270ed5c62d3fa33748036069f49ba54f255473c
SHA256ccd913f7c78fc52387f56bbe09d946ae7633019385a265cbed2d83c4d346d7ed
SHA51211bb2c32cbcf415414ab6c8ad0356c4337173b3b3cf706c944efe5288d6c1ff42858d7bdad6e488b82415f7d1a67dc73f6cfbc7171716981561bd8d148cb84b7