Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe
-
Size
159KB
-
MD5
5e7ac0eae9d3b069d90bd5ad849ba95e
-
SHA1
ec62389ded761792251db4c570f6eee244d455a8
-
SHA256
1065b07430c3cd64c927c8fefaa7b0cfd8892c85601b04b4052515021f3d5a8e
-
SHA512
8cecd1555e04fca0afcf1cb81f12cf43e34e04c9c5bd520a23b38069d64782b80451e82f553d1af04c1ea3982e04d2824263da145d1ce922a9f61698d424ce5b
-
SSDEEP
3072:IiwZSd/+kqiGmo41k7cKJG+RZYOf1g7d7ZHGuR67VvRJ4p7T:IiwZSd3qin1ScKbRZl1gJ7K1G
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1736 CA0A49823D6.exe 588 JPAB6A2.exe -
Loads dropped DLL 4 IoCs
pid Process 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 1736 CA0A49823D6.exe 1736 CA0A49823D6.exe -
resource yara_rule behavioral1/memory/328-1-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/328-0-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/328-5-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/328-6-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/328-19-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1736-25-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1736-29-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1736-24-0x0000000000400000-0x000000000045F000-memory.dmp upx behavioral1/memory/1736-22-0x0000000000400000-0x000000000045F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\UJ7J2I3XXGVF9Y5EX = "C:\\sooi832.bin\\CA0A49823D6.exe /q" JPAB6A2.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter JPAB6A2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" JPAB6A2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" JPAB6A2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery JPAB6A2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" JPAB6A2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 1736 CA0A49823D6.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe 588 JPAB6A2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe Token: SeDebugPrivilege 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe Token: SeDebugPrivilege 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe Token: SeDebugPrivilege 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe Token: SeDebugPrivilege 1736 CA0A49823D6.exe Token: SeDebugPrivilege 1736 CA0A49823D6.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe Token: SeDebugPrivilege 588 JPAB6A2.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 328 wrote to memory of 1736 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 30 PID 328 wrote to memory of 1736 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 30 PID 328 wrote to memory of 1736 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 30 PID 328 wrote to memory of 1736 328 5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe 30 PID 1736 wrote to memory of 588 1736 CA0A49823D6.exe 31 PID 1736 wrote to memory of 588 1736 CA0A49823D6.exe 31 PID 1736 wrote to memory of 588 1736 CA0A49823D6.exe 31 PID 1736 wrote to memory of 588 1736 CA0A49823D6.exe 31 PID 1736 wrote to memory of 588 1736 CA0A49823D6.exe 31 PID 1736 wrote to memory of 588 1736 CA0A49823D6.exe 31 PID 588 wrote to memory of 328 588 JPAB6A2.exe 29 PID 588 wrote to memory of 328 588 JPAB6A2.exe 29 PID 588 wrote to memory of 328 588 JPAB6A2.exe 29 PID 588 wrote to memory of 328 588 JPAB6A2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e7ac0eae9d3b069d90bd5ad849ba95e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:328 -
C:\sooi832.bin\CA0A49823D6.exe"C:\sooi832.bin\CA0A49823D6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\JPAB6A2.exe"C:\Users\Admin\AppData\Local\Temp\JPAB6A2.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD57f9a665ec1dbec7bd974ff537e4cb18c
SHA1d56c208ec63b758b4883b1c378645277f5a4ebf3
SHA256ec28a53affa2e18a0ad9a5414cda7b317a60f3ff01d5179b20a08b6d57da17fb
SHA512a3196350125327029947c368d7aed962f66d9cabce851bcdc6393f454f22da8e951b11484ce16e84caf9189d59122d35b08f6fc158e45574b7b9e94fbc7b3be1
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
159KB
MD55e7ac0eae9d3b069d90bd5ad849ba95e
SHA1ec62389ded761792251db4c570f6eee244d455a8
SHA2561065b07430c3cd64c927c8fefaa7b0cfd8892c85601b04b4052515021f3d5a8e
SHA5128cecd1555e04fca0afcf1cb81f12cf43e34e04c9c5bd520a23b38069d64782b80451e82f553d1af04c1ea3982e04d2824263da145d1ce922a9f61698d424ce5b