Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 12:21
Behavioral task
behavioral1
Sample
609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe
-
Size
202KB
-
MD5
609196f1f60617d3d527d2673a9ed886
-
SHA1
f59ecb48afece41c70c4acaa94a019c3bbfe92f2
-
SHA256
ff7593abfbe85474a276d2cf28d60cd7fb514ee5c376336f942982147b48a802
-
SHA512
f9daddaecbfff4187516dc060ac24396c8996a46f330d3cf87721d958c9943424eaa08cc4eaa8c18c0db76b31377cababc7cfad24d6499fc52bcb0b086bc4dea
-
SSDEEP
6144:VNNSN06BtfEcThfUiAHSZLufLsdANIf+UWT:PIN0CpEcFfUvwifNI2U2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2336 Kqecoa.exe -
resource yara_rule behavioral2/memory/3212-0-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/files/0x0008000000023452-11.dat upx behavioral2/memory/2336-14-0x0000000000400000-0x000000000046F000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Kqecoa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe File created C:\Windows\Kqecoa.exe 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe File opened for modification C:\Windows\Kqecoa.exe 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Kqecoa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 37140 2336 WerFault.exe 87 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main Kqecoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe 2336 Kqecoa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3212 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe 2336 Kqecoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2336 3212 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe 87 PID 3212 wrote to memory of 2336 3212 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe 87 PID 3212 wrote to memory of 2336 3212 609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\609196f1f60617d3d527d2673a9ed886_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\Kqecoa.exeC:\Windows\Kqecoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 9003⤵
- Program crash
PID:37140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2336 -ip 23361⤵PID:37100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5609196f1f60617d3d527d2673a9ed886
SHA1f59ecb48afece41c70c4acaa94a019c3bbfe92f2
SHA256ff7593abfbe85474a276d2cf28d60cd7fb514ee5c376336f942982147b48a802
SHA512f9daddaecbfff4187516dc060ac24396c8996a46f330d3cf87721d958c9943424eaa08cc4eaa8c18c0db76b31377cababc7cfad24d6499fc52bcb0b086bc4dea
-
Filesize
390B
MD5381d73acb1b78743979fc3e2a023fb49
SHA165cbb32f0b2ec8728d9f7c676a7a461181d56c55
SHA25641d5f6969e99132cd7536db56611facb18aacdb3351fac410b7d8768a927ba57
SHA51288a83387848b1c2265f611a7c86916e8786bbafe54cdf741e18c34d05e33aebd3984cc715de56e7134618c6b155645f76490750b65842ba9a9d39f789545fb90