Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe
-
Size
591KB
-
MD5
5c4284c546325e0e8dd3d85c629392b3
-
SHA1
62dc874deefce86f0a4c40d6be67e3d0d21018eb
-
SHA256
e54e61bd605c196dcbef3e3c6b99530d0481ae0930fb26a7b7ff5139ae8af568
-
SHA512
61e371a2c72a9e6d678ab3155c8043e138f4439d91f38400e49e2b53e52196acdbdd570d87cfa308c6a9ca42ce2399fbc7748043cf283a3d39268dbb6f662275
-
SSDEEP
12288:aDTkcfuqYfjqTfEJOMlfD0ZI423TIF3Z4mxx/Q7zpT5ZYR8oHe5qD:aDTpfuJbqTEO8D8h23cQmX/oTJoHr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2296 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2552 G_Telnet -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\G_Telnet 5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe File opened for modification C:\Windows\G_Telnet 5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe File created C:\Windows\Delete.bat 5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties G_Telnet Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" G_Telnet Key created \REGISTRY\USER\.DEFAULT\System G_Telnet Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet G_Telnet Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties G_Telnet Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick G_Telnet Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm G_Telnet Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm G_Telnet Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control G_Telnet -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 G_Telnet -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2552 wrote to memory of 320 2552 G_Telnet 31 PID 2552 wrote to memory of 320 2552 G_Telnet 31 PID 2552 wrote to memory of 320 2552 G_Telnet 31 PID 2552 wrote to memory of 320 2552 G_Telnet 31 PID 2624 wrote to memory of 2296 2624 5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2296 2624 5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2296 2624 5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2296 2624 5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c4284c546325e0e8dd3d85c629392b3_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat2⤵
- Deletes itself
PID:2296
-
-
C:\Windows\G_TelnetC:\Windows\G_Telnet1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5bf7df97fc9415d6d77974a1a464f0b09
SHA1418f37ba14c989d40c56ec9c041e2bd6cc8c79e7
SHA2561bb7bcb6f1cf499c11872623070454f3e7e7b0945178416e80d2d50090c32dbc
SHA51280d44b653c3d8163a16b5f6105aab9dbe3f9b7e25a13d9dd05cd132eab7d76e8f56e59a0c654e743643199852d7a216fda4076b6c6d4b9fda1be1fee81c59c5f
-
Filesize
591KB
MD55c4284c546325e0e8dd3d85c629392b3
SHA162dc874deefce86f0a4c40d6be67e3d0d21018eb
SHA256e54e61bd605c196dcbef3e3c6b99530d0481ae0930fb26a7b7ff5139ae8af568
SHA51261e371a2c72a9e6d678ab3155c8043e138f4439d91f38400e49e2b53e52196acdbdd570d87cfa308c6a9ca42ce2399fbc7748043cf283a3d39268dbb6f662275