Analysis
-
max time kernel
144s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 03:11
Behavioral task
behavioral1
Sample
4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe
-
Size
137KB
-
MD5
4c90a4308f902e87cd423ce06fc917c2
-
SHA1
e9ce764240ae0acf166e26917c40dd1bf0704983
-
SHA256
4a75c23e7f2c2ffcb488436e95fe2a99941e47b6f95c1628e13fa735fd00bbe5
-
SHA512
e5f5ea036f313d8fdb242a5151218a4db6bb0ecfdb15e6c243058ee97c665348fce955a02a01bb8aba4837852b8dd56fc3d03ddc18e0e12e9358cedf087ed839
-
SSDEEP
3072:utrUTOOAwmgu0mMBCWajxnE1bASCBLoz+qcfhUmoPT/:utrkhAn0msCjGASAqR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1220 Crecaa.exe -
resource yara_rule behavioral2/memory/4492-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0009000000023449-11.dat upx behavioral2/memory/1220-14-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe File created C:\Windows\Crecaa.exe 4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe File opened for modification C:\Windows\Crecaa.exe 4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Crecaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Crecaa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 119720 1220 WerFault.exe 86 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Internet Explorer\Main Crecaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe 1220 Crecaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4492 wrote to memory of 1220 4492 4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe 86 PID 4492 wrote to memory of 1220 4492 4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe 86 PID 4492 wrote to memory of 1220 4492 4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c90a4308f902e87cd423ce06fc917c2_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\Crecaa.exeC:\Windows\Crecaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 5363⤵
- Program crash
PID:119720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1220 -ip 12201⤵PID:119696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD54c90a4308f902e87cd423ce06fc917c2
SHA1e9ce764240ae0acf166e26917c40dd1bf0704983
SHA2564a75c23e7f2c2ffcb488436e95fe2a99941e47b6f95c1628e13fa735fd00bbe5
SHA512e5f5ea036f313d8fdb242a5151218a4db6bb0ecfdb15e6c243058ee97c665348fce955a02a01bb8aba4837852b8dd56fc3d03ddc18e0e12e9358cedf087ed839
-
Filesize
390B
MD54e8551d4e91c27791fea8ed8f11c2893
SHA1fc78b36e1f398b52bacdf85d7b5b4f7c1753cd03
SHA25695118e122535a08ea197631ed13e820985e9250ba2a014cb6684a5f8f982d4bb
SHA512c5dccac87878184e4c43227b6a829256741f09ff113782fd85ff67ce854410a3785a7e45d61ecccede429236e6d2c33ed61a6fc192c6015988fccca4d51502d4