Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 00:20
Static task
static1
Behavioral task
behavioral1
Sample
4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe
-
Size
116KB
-
MD5
4c09761b8039307d3d23a9bd46a2b34e
-
SHA1
8c587a20526b5c07d7f372ed7a7739ef25f7a0ad
-
SHA256
9373b5f2a4af89b44e376d0a10efcce7cca7770b4a41959548b2d44f41e56145
-
SHA512
2e85729aaede12129405fa7f4354022e462ad8cea215f259c0023d78b8bd1a33f1b7d44c2b97c45f4b4488951e240b33b6a98ff767d822dac0d4ce428ac97591
-
SSDEEP
3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5d/U:SZRcx5VMpOKXur2Qf+5d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2452 Bsejya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe File created C:\Windows\Bsejya.exe 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe File opened for modification C:\Windows\Bsejya.exe 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Bsejya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Bsejya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main Bsejya.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International Bsejya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe 2452 Bsejya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2452 1596 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe 31 PID 1596 wrote to memory of 2452 1596 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe 31 PID 1596 wrote to memory of 2452 1596 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe 31 PID 1596 wrote to memory of 2452 1596 4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c09761b8039307d3d23a9bd46a2b34e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\Bsejya.exeC:\Windows\Bsejya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
116KB
MD54c09761b8039307d3d23a9bd46a2b34e
SHA18c587a20526b5c07d7f372ed7a7739ef25f7a0ad
SHA2569373b5f2a4af89b44e376d0a10efcce7cca7770b4a41959548b2d44f41e56145
SHA5122e85729aaede12129405fa7f4354022e462ad8cea215f259c0023d78b8bd1a33f1b7d44c2b97c45f4b4488951e240b33b6a98ff767d822dac0d4ce428ac97591
-
Filesize
372B
MD523b8c3afc6b9cb352098c836132cfe8c
SHA16207ef29f603b06dc1c70ef1ab35e585988329b3
SHA2563180ab3c10584867017b6ea64c0654ec9573255b37c06c3c496f87998e30e359
SHA5128f80465932fa159c2b1d4d7f5069bd746efcfa731e7a50049fc42fb5fe9a5362b7e49ad198e85ee32977ba692ac8537483daf427901b060022eb5d285dc13ea7