Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe
-
Size
156KB
-
MD5
5f05acd53cfd91fb4dba3660ad1e3add
-
SHA1
e3b5561d3c4f88c09f818554f98cc107855a74c2
-
SHA256
962810f908daab4ed0796ff563433eb65a60507d23089ad4c9b25ccf2c8c7837
-
SHA512
4d51d6b5866f292858b83177fb8ff93aca2ae7da50e75e6f5f471aff793b1236d1e9daa09d357b61f9941232038933d66deddaec9e160e4f90ca5a538f95d899
-
SSDEEP
3072:HhHrC+oLYhOE/zdJTbrYpXUJ8/eCn3AkSxj9MrOQUvH695L:HNr/ochd/zdJTbrQUu/v3RSZE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1244 msieckc.exe -
Loads dropped DLL 5 IoCs
pid Process 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\msieckc.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\DES64v7\\msieckc.exe" msieckc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1244 msieckc.exe 1244 msieckc.exe 1244 msieckc.exe 1244 msieckc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 776 wrote to memory of 1244 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 30 PID 776 wrote to memory of 1244 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 30 PID 776 wrote to memory of 1244 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 30 PID 776 wrote to memory of 1244 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 30 PID 776 wrote to memory of 1244 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 30 PID 776 wrote to memory of 1244 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 30 PID 776 wrote to memory of 1244 776 5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f05acd53cfd91fb4dba3660ad1e3add_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\DES64v7\msieckc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\DES64v7\msieckc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5cd3aeff3114f49e032d99bc26ae3a00c
SHA139cb94ce5ae75c43dc1999fed148dad8f56dc5fb
SHA256b662f0d6d06fa5e6dd51a3d0c4ea3be38210200443c4f6250c3c7b7d8a9a9911
SHA512ff7535859a140a92ccf7cbdae1041b017a9554947fd5f671458c8f05340c64b64954d8865b837e012b6f1697ab6ee9e988134e868292ee0b7b58ee3d3d01c99c