Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe
-
Size
606KB
-
MD5
4a1ccbaad9869a37a032fd2aa03be4a9
-
SHA1
4d61795023c9c7d4040f6e7091325868ce3bedf4
-
SHA256
ed07a209026e6ae33832e8873824dc9f1cbf06f2b7698255a0df7ee3ee356151
-
SHA512
6a6c4345e8b1b324c8abec12ee91d48a32552cdfe7ef888c4f5feef88d22931e81db550ff49ad418a273b553881c0041d8a8a23812efeeedf74432300456006b
-
SSDEEP
12288:bdEK5HO2efzbp+o/txfaWF3Z4mxxp+43xU4Ak8hTbBUWfTc:bdEnLbn1vQmXt3x7l8ZVPc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 940 4.EXE 4052 dll.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\DF5Servi 4.EXE Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\DF5Servi\ = "Service" 4.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\DF5Servi dll.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\DF5Servi\ = "Service" dll.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dll.exe 4.EXE File opened for modification C:\Windows\SysWOW64\dll.exe 4.EXE File created C:\Windows\SysWOW64\dll.exe dll.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4072 wrote to memory of 940 4072 4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe 83 PID 4072 wrote to memory of 940 4072 4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe 83 PID 4072 wrote to memory of 940 4072 4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe 83 PID 4052 wrote to memory of 3936 4052 dll.exe 86 PID 4052 wrote to memory of 3936 4052 dll.exe 86 PID 4052 wrote to memory of 3936 4052 dll.exe 86 PID 940 wrote to memory of 2608 940 4.EXE 88 PID 940 wrote to memory of 2608 940 4.EXE 88 PID 940 wrote to memory of 2608 940 4.EXE 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4a1ccbaad9869a37a032fd2aa03be4a9_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE2⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE"3⤵PID:2608
-
-
-
C:\Windows\SysWOW64\dll.exeC:\Windows\SysWOW64\dll.exe1⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\dll.exe"2⤵PID:3936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD534d8d594c2894193c37de817c28c6d65
SHA1e149d24d005b0580631f79b7ae9defd63e1dae26
SHA2566af2050b42226ee767badb5688c439e6a838198aa4f98eaaa520fb1b8022c347
SHA512a87a7d4f404c498ab69ea5a59c50074914cd4dbeec21a97edbc98bc1344492179c22958b29b939d87d2bbf969e79ee4140e889251ef8308ba4ebc02918502a7b