Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 19:20
Behavioral task
behavioral1
Sample
4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe
-
Size
134KB
-
MD5
4b0e7889a671656f0e3cc1421ff5713e
-
SHA1
942e086b27b0d8e97128c07c622f1a0122c16115
-
SHA256
dab8dbb28065b7ca6baa7d4eea6178183a35784b3a52fac8f851660354bdeca7
-
SHA512
d07111567ff6509a624f89d11c1d8b8c4a862239179c62509ad57d12e9c4e28520d19c8eb47607c26191f466936b9fa4b91cc7acf00d952cb8bcc1edcca0df60
-
SSDEEP
3072:VXe4EJ+LOkaiyzzYGuVKqxIXtgsB3+ksmanwBKdX7JvQtK:VXexkaiPYqxIdgyhmwBKdrJW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2224 Rmexua.exe -
resource yara_rule behavioral1/memory/3044-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x00080000000175f2-8.dat upx behavioral1/memory/2224-10-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\2SPI9KEA4C = "C:\\Windows\\Rmexua.exe" Rmexua.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe File created C:\Windows\Rmexua.exe 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe File opened for modification C:\Windows\Rmexua.exe 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main Rmexua.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\International Rmexua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe 2224 Rmexua.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3044 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe 2224 Rmexua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2224 3044 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe 29 PID 3044 wrote to memory of 2224 3044 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe 29 PID 3044 wrote to memory of 2224 3044 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe 29 PID 3044 wrote to memory of 2224 3044 4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b0e7889a671656f0e3cc1421ff5713e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Rmexua.exeC:\Windows\Rmexua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD54b0e7889a671656f0e3cc1421ff5713e
SHA1942e086b27b0d8e97128c07c622f1a0122c16115
SHA256dab8dbb28065b7ca6baa7d4eea6178183a35784b3a52fac8f851660354bdeca7
SHA512d07111567ff6509a624f89d11c1d8b8c4a862239179c62509ad57d12e9c4e28520d19c8eb47607c26191f466936b9fa4b91cc7acf00d952cb8bcc1edcca0df60
-
Filesize
372B
MD5d199823a9f0e9b553173ca4ec14c0708
SHA19b2661f5392238878b2f1ac6fa251d613cb0a082
SHA25613fde6cd158e7e11e0c80b79cb914a7188d9709a0ab6965bc4bd49f5d535f4c7
SHA512e4fb0102fe4d9026a13e48fbd2e21cb0c3a3c5234089a903dd938be5271ec2a7ced17b14f8bdbeb288b2449fcda6083da1372f30e2fea967a40338cba74eb6fd