Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe
-
Size
28KB
-
MD5
59eecd91d6f5be7d23d9ad5eab1a788a
-
SHA1
e282855f7f0226e9bc49c726b13e9a8f4dfbc5e3
-
SHA256
b4eed01f69422039d0f550f9edac95a1687b7a21b01879a0dfbc3b873e61642e
-
SHA512
d09e11e25aef1d8e477376cd9562e5b25d70c6c036ca6440757b1e93a594eb65e747c295bc9d14ead5f52a58c997f63f8ce22b8da9c50aeb9f67f1ff57f97a7c
-
SSDEEP
384:g9c/lju92SNHNjctHds2HUWT6VI/x/DryPS:g9kli9jNOtH70/VCLWP
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1272 attrib.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UUcallo = "c:\\woKuto.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Main 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.dxcpm.com/?33_20240719" 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3648 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 84 PID 4880 wrote to memory of 3648 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 84 PID 4880 wrote to memory of 3648 4880 59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe 84 PID 3648 wrote to memory of 1272 3648 cmd.exe 86 PID 3648 wrote to memory of 1272 3648 cmd.exe 86 PID 3648 wrote to memory of 1272 3648 cmd.exe 86 PID 3648 wrote to memory of 4284 3648 cmd.exe 87 PID 3648 wrote to memory of 4284 3648 cmd.exe 87 PID 3648 wrote to memory of 4284 3648 cmd.exe 87 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1272 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59eecd91d6f5be7d23d9ad5eab1a788a_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Dx.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h c:\woKuto.exe3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1272
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v UUcallo /t REG_SZ /d c:\woKuto.exe /f3⤵
- Adds Run key to start application
PID:4284
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD58d4df9dcbbc211fe2190e4ea64ca433e
SHA16de1295f3eecdee159b3e98f671dc50aeb060c1b
SHA256932f00d5ba5de4cae838cb52501ccf8be5ccd7eeb0a6e9bafab137303132938a
SHA512099ce4a45f91a32a1f2cc0bd2ffd41a653dd6d883db1d1aff29130ff3785db9a97efd70f44afe35749a6dbe4c391bf9ba3c630fbaa4aee944de7ee6c5d39c8cb
-
Filesize
28KB
MD559eecd91d6f5be7d23d9ad5eab1a788a
SHA1e282855f7f0226e9bc49c726b13e9a8f4dfbc5e3
SHA256b4eed01f69422039d0f550f9edac95a1687b7a21b01879a0dfbc3b873e61642e
SHA512d09e11e25aef1d8e477376cd9562e5b25d70c6c036ca6440757b1e93a594eb65e747c295bc9d14ead5f52a58c997f63f8ce22b8da9c50aeb9f67f1ff57f97a7c