Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 23:50
Behavioral task
behavioral1
Sample
607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe
-
Size
351KB
-
MD5
607bb2277992a33164ff24a59eba8843
-
SHA1
8671951f1daf8cf67e096fc8c632facd675ef891
-
SHA256
805fd75e9bba5b32d3b5e0e4502bdba10431f01542d8d217f8550a35a56ad2f5
-
SHA512
ea31326aff0a2397afde12935367ac7f730088d9227e999f04c282c964aeee5c834f6302a27ac5201d7910297668ffa5f8bb15917d55a747672bd8b3cba8bee8
-
SSDEEP
3072:QqRAFgKD5iLDeZl/AtADljPzXbMrawgkeAubbixuB2MiOQHQRvOxop0o:QqKgmwfeZlVt7graw1uKoQwUn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1428 Rkywia.exe -
resource yara_rule behavioral2/memory/3100-0-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral2/files/0x00080000000234a9-11.dat upx behavioral2/memory/1428-14-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File created C:\Windows\Rkywia.exe 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File opened for modification C:\Windows\Rkywia.exe 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rkywia.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rkywia.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 195304 1428 WerFault.exe 87 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Main Rkywia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe 1428 Rkywia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1428 3100 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 87 PID 3100 wrote to memory of 1428 3100 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 87 PID 3100 wrote to memory of 1428 3100 607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\607bb2277992a33164ff24a59eba8843_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\Rkywia.exeC:\Windows\Rkywia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 7803⤵
- Program crash
PID:195304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1428 -ip 14281⤵PID:195276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD5607bb2277992a33164ff24a59eba8843
SHA18671951f1daf8cf67e096fc8c632facd675ef891
SHA256805fd75e9bba5b32d3b5e0e4502bdba10431f01542d8d217f8550a35a56ad2f5
SHA512ea31326aff0a2397afde12935367ac7f730088d9227e999f04c282c964aeee5c834f6302a27ac5201d7910297668ffa5f8bb15917d55a747672bd8b3cba8bee8
-
Filesize
390B
MD5162926c1b7208f0032fab4b591107b99
SHA1e80a5d7ea0e2eb382bc0da05fa7d095a80e81416
SHA25663dbeda8b0c6fe68e4fac5fdb4a3a20d5876a7f402c5bffd8df7f3f0cc635eed
SHA5120a5fe153ecaac7ae054fb8d54759b4a66664185d77e96f3f61e0dbc07620346685ed88026586d1fc20dc63f3a661ca70e966c022398b75380537da9ea5d81db9