Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe
-
Size
384KB
-
MD5
61eb589fb1c44ca16abca2bbf9abf385
-
SHA1
94251869fbeb1a74c2007266f27cbb39378de70b
-
SHA256
68f0221792ea999e00c5f341442a9ef37b23c51e7b52428a94defb396ffd54d2
-
SHA512
fb6d83e82231d704f5600c21419a0924fb8d6202fa6a27952595f78c025d33a4d17a0ed3156b5ddb4105351f84c10a763e47725831eee7218523a84618647eba
-
SSDEEP
6144:P5nimmel2WhTW1NlO2i9qLB3P7pVFgPH85ZAoetJe5NsVwVCWh:P5ni6TTW1NAUlzKNe5NsGVh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2280 gJ10400NgNiI10400.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 gJ10400NgNiI10400.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2072-1-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/2072-18-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/2280-25-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/2280-29-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/2280-38-0x0000000000400000-0x00000000004EE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\gJ10400NgNiI10400 = "C:\\ProgramData\\gJ10400NgNiI10400\\gJ10400NgNiI10400.exe" gJ10400NgNiI10400.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main gJ10400NgNiI10400.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe Token: SeDebugPrivilege 2280 gJ10400NgNiI10400.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2280 gJ10400NgNiI10400.exe 2280 gJ10400NgNiI10400.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2280 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2280 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2280 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2280 2072 61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\ProgramData\gJ10400NgNiI10400\gJ10400NgNiI10400.exe"C:\ProgramData\gJ10400NgNiI10400\gJ10400NgNiI10400.exe" "C:\Users\Admin\AppData\Local\Temp\61eb589fb1c44ca16abca2bbf9abf385_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD503f923471664343083ff80406761249d
SHA19fbfc18ff55eefcd6184893c3bdcf0f9cf22b4e6
SHA256f388942482930ad993e91f9a3379859e88587e91b08349b4dcb84230c909ae35
SHA5128b1aa89be142f2b630bd6dfedba7ed4304c3d746b3f36adcad963cc951bc7ace96ecf7a94aef8d399e57efec24e90aaa7e6a3f89388d64c41d6fe126f883d69c
-
Filesize
384KB
MD572ead24be55be3b74224a5d635a21808
SHA1a17cb82cb84de4fd115f61602a4c851b983d5a72
SHA256cb44764b3f41cc116c222ed84d6277a5646ca679e9c34f487b3e7c415b82e03f
SHA512e69b188a2df607675b238877f84abb55bb9bcfe492eadb57704121ea51b72315b0b56c1a60ecae91423be48d318c5bf6c0be6766b1ab2cb4574afce868a3589f