Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 16:41
Behavioral task
behavioral1
Sample
5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe
-
Size
466KB
-
MD5
5838e56cfdf1d8d3cd62062286fec1c9
-
SHA1
99b01e5d0f468a6cd7757da5494c7d333ef87b26
-
SHA256
0a985861a594bcd56d5da1ceb146d50c419497d4730d5728c832376e232692f5
-
SHA512
ca5e738615b2aa163c8b0f2aa9a899dccc40506ab0f6c844d5312f4e6ab40f347de20b73ed88dee5260ae07226964279fef415aafffe2fd4b96856e42663388e
-
SSDEEP
12288:m6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1UF7:m6tQCG0UUPzEkTn4AC1+K
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2684 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
myovf.exeetkus.exepid process 2680 myovf.exe 1792 etkus.exe -
Loads dropped DLL 2 IoCs
Processes:
5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exemyovf.exepid process 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe 2680 myovf.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\etkus.exe upx behavioral1/memory/1792-28-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1792-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1792-31-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1792-32-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1792-33-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/1792-34-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
etkus.exepid process 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe 1792 etkus.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exemyovf.exedescription pid process target process PID 2644 wrote to memory of 2680 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe myovf.exe PID 2644 wrote to memory of 2680 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe myovf.exe PID 2644 wrote to memory of 2680 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe myovf.exe PID 2644 wrote to memory of 2680 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe myovf.exe PID 2644 wrote to memory of 2684 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe cmd.exe PID 2644 wrote to memory of 2684 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe cmd.exe PID 2644 wrote to memory of 2684 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe cmd.exe PID 2644 wrote to memory of 2684 2644 5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe cmd.exe PID 2680 wrote to memory of 1792 2680 myovf.exe etkus.exe PID 2680 wrote to memory of 1792 2680 myovf.exe etkus.exe PID 2680 wrote to memory of 1792 2680 myovf.exe etkus.exe PID 2680 wrote to memory of 1792 2680 myovf.exe etkus.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5838e56cfdf1d8d3cd62062286fec1c9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\myovf.exe"C:\Users\Admin\AppData\Local\Temp\myovf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\etkus.exe"C:\Users\Admin\AppData\Local\Temp\etkus.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- Deletes itself
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD50d2b7d91b533c39e8fe7910bc8fb17a5
SHA110b87da48ff0448aad59dad6671435523ddc1b5a
SHA256a80437b8d37626ff88946dc966072b525a8b2b5259d82e802bad0ba07637a625
SHA512dff0b6e70e9967ee423a5730413720afcfae4b967e16b60b1b9ab9765cffb3531b64f85fc6502978d7c27cee0c9d260e8d53dc8417061042d8413eb5464f5c7f
-
Filesize
512B
MD57079ff8e093e2b8dfa4105862fa35f6c
SHA11d17161dcdedeb6acde09aa7ca0b7a0f8506b76b
SHA25649b7b9096f0d1129b05c36e94af2988c84016aceb135a147f48b3916bc06d0d8
SHA512475c7751ef6f6a9d9d064d637ab21632e2a81155d31bc7ad23f926a35165cd4482c3ddea8964c383a061950967c0470cefc91fad6dbfa6804fd7d8a543259ccf
-
Filesize
198KB
MD5fd7c369e83a5949aaf2da2f5cbae020b
SHA1024deaa482e584289b0f05c9db7676fcce5d7b36
SHA256c3775fbb98ae4e45c5840ea1c1c28645a857e0edcae683c55f5af08d3f3325d6
SHA512206c5d46507d3c9a88e5d6a5e2493227ca0b81b2a11e97ba1d6476a980d81485baff7e3f3cb14f500b1c72d58d18e5422c6bca191d3e2a38459ee43ab5de4b6c
-
Filesize
466KB
MD59f96b21c300373184aa31e3f5a3bc37d
SHA1be8703081359169ba4004a3af8ff345293eb2f01
SHA25684f052e71fe20043a2cc2ff9f5f1346d000e65683947ab2cdc29004370888d43
SHA512f7f890d63317ed27244b37a669f5d53fb16dc403395150c0117a3a087d9ee6a3429847e1ac308e55b3e4d2a19ad70492704784e07adfdfa53f6d16bd986a2e8d