Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 23:50
Behavioral task
behavioral1
Sample
607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe
-
Size
351KB
-
MD5
607bb2277992a33164ff24a59eba8843
-
SHA1
8671951f1daf8cf67e096fc8c632facd675ef891
-
SHA256
805fd75e9bba5b32d3b5e0e4502bdba10431f01542d8d217f8550a35a56ad2f5
-
SHA512
ea31326aff0a2397afde12935367ac7f730088d9227e999f04c282c964aeee5c834f6302a27ac5201d7910297668ffa5f8bb15917d55a747672bd8b3cba8bee8
-
SSDEEP
3072:QqRAFgKD5iLDeZl/AtADljPzXbMrawgkeAubbixuB2MiOQHQRvOxop0o:QqKgmwfeZlVt7graw1uKoQwUn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 Plarua.exe -
resource yara_rule behavioral1/memory/3028-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x0008000000018bb8-12.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File created C:\Windows\Plarua.exe 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File opened for modification C:\Windows\Plarua.exe 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Plarua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Plarua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main Plarua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe 1932 Plarua.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3028 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 1932 Plarua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1932 3028 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 30 PID 3028 wrote to memory of 1932 3028 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 30 PID 3028 wrote to memory of 1932 3028 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 30 PID 3028 wrote to memory of 1932 3028 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Plarua.exeC:\Windows\Plarua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD5607bb2277992a33164ff24a59eba8843
SHA18671951f1daf8cf67e096fc8c632facd675ef891
SHA256805fd75e9bba5b32d3b5e0e4502bdba10431f01542d8d217f8550a35a56ad2f5
SHA512ea31326aff0a2397afde12935367ac7f730088d9227e999f04c282c964aeee5c834f6302a27ac5201d7910297668ffa5f8bb15917d55a747672bd8b3cba8bee8
-
Filesize
372B
MD5d5d26667e3d071965af5d4d755f0d3aa
SHA10896e475fd067270fa69db140b7f7473043ebefd
SHA256402dfbbeeb1cc0acab6d1310b558dd38364340c6105d41b5b3a3e35196adfafc
SHA512771d7ef0fb1e236a95a55b9a2848b630fb937beec10786be8585f3a75ec89d8167341ae15b151835e742113a157fb5c7fe07af8fd3c438f83796b22e31341f00