Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe
-
Size
964KB
-
MD5
49b3a9235f8f6ba42f23639245e24def
-
SHA1
ca3ae9dba6fed3202a5c9dd5a6483dacaa0e5dbc
-
SHA256
af8f1a41acf398ca367f1b4813f44cac040f442afa5a985f42a514aeb6b238ac
-
SHA512
aad5e1872ec7c924b80550ffece18502657db56f154e9fac5bb4e0e97aa5e59d850d5c2a41e1e352fee976647868ee2c3619c48d61ef99553b237719812a36ae
-
SSDEEP
24576:+ER3WHqaSd5V5nUUfy/OdszZ11IwrZQmXMVTzLR:BRmZSd5oh/Od6Z11Cm8r
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3392 SCRAMB~1.EXE 4972 SCRAMB~1.EXE 2696 iexplore.exe 2484 iexplore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3392 set thread context of 4972 3392 SCRAMB~1.EXE 87 PID 2696 set thread context of 2484 2696 iexplore.exe 89 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\debug\iexplore.exe SCRAMB~1.EXE File created C:\Windows\Delete.bat SCRAMB~1.EXE File created C:\Windows\debug\iexplore.exe SCRAMB~1.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 3844 2484 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 684 wrote to memory of 3392 684 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 84 PID 684 wrote to memory of 3392 684 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 84 PID 684 wrote to memory of 3392 684 49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe 84 PID 3392 wrote to memory of 4972 3392 SCRAMB~1.EXE 87 PID 3392 wrote to memory of 4972 3392 SCRAMB~1.EXE 87 PID 3392 wrote to memory of 4972 3392 SCRAMB~1.EXE 87 PID 3392 wrote to memory of 4972 3392 SCRAMB~1.EXE 87 PID 3392 wrote to memory of 4972 3392 SCRAMB~1.EXE 87 PID 2696 wrote to memory of 2484 2696 iexplore.exe 89 PID 2696 wrote to memory of 2484 2696 iexplore.exe 89 PID 2696 wrote to memory of 2484 2696 iexplore.exe 89 PID 2696 wrote to memory of 2484 2696 iexplore.exe 89 PID 4972 wrote to memory of 4072 4972 SCRAMB~1.EXE 90 PID 4972 wrote to memory of 4072 4972 SCRAMB~1.EXE 90 PID 4972 wrote to memory of 4072 4972 SCRAMB~1.EXE 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49b3a9235f8f6ba42f23639245e24def_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat4⤵PID:4072
-
-
-
-
C:\Windows\debug\iexplore.exeC:\Windows\debug\iexplore.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\debug\iexplore.exeC:\Windows\debug\iexplore.exe2⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 843⤵
- Program crash
PID:3844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2484 -ip 24841⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD525ce0814bb31d1a43a3f75f4e61f81d5
SHA17270ed5c62d3fa33748036069f49ba54f255473c
SHA256ccd913f7c78fc52387f56bbe09d946ae7633019385a265cbed2d83c4d346d7ed
SHA51211bb2c32cbcf415414ab6c8ad0356c4337173b3b3cf706c944efe5288d6c1ff42858d7bdad6e488b82415f7d1a67dc73f6cfbc7171716981561bd8d148cb84b7
-
Filesize
160B
MD5986b83f89e84a61179e9a199bf0533eb
SHA1f9af4d9e5efea970a5b02a14c9be533aadb7d07d
SHA25680b9e3d48eea89c021ac38a6a8bcb1381a318e50c152e3c7d4a4f89eb6483b7e
SHA512890c6703e92541ec77b0a8c7c5767f08928dccfc962dc45a31463e8d01d6bef56730d9898acff80065321bf3b45fc480186ea402e5ade8541dd2795214076746