Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe
-
Size
436KB
-
MD5
64e53ab5b711e3bf7f2ca518bab8bb47
-
SHA1
991364bb8faa7a8cbae86bccabb709059c561e5c
-
SHA256
da0500a6ab1e9d4e3595ee0ea3802466ba947fb198f51c3049eac4a2898804bf
-
SHA512
1eafbd2db14a762be03a7b23fcae86bf3f90bf8a3dd78d85119cd692afecd8be76ad1e6013ee316fb84f92c81ae2704a6d15432ad13a67c60c6b376d5ee7e56d
-
SSDEEP
12288:9+UGYCh/RlUOjfvTFLCQnxZKT9An7s99ggMXwsAyW:9+UGYCh517vpCQnNAD5s
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2656 yxJTUiXVvg.exe -
Loads dropped DLL 2 IoCs
pid Process 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1876-2-0x0000000000600000-0x0000000000675000-memory.dmp upx behavioral1/memory/1876-3-0x0000000000600000-0x0000000000675000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\yxJTUiXVvg = "C:\\ProgramData\\yxJTUiXVvg.exe" 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum yxJTUiXVvg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 yxJTUiXVvg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Download 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe 2656 yxJTUiXVvg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2656 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 31 PID 1876 wrote to memory of 2656 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 31 PID 1876 wrote to memory of 2656 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 31 PID 1876 wrote to memory of 2656 1876 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64e53ab5b711e3bf7f2ca518bab8bb47_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1876 -
C:\ProgramData\yxJTUiXVvg.exe"C:\ProgramData\yxJTUiXVvg.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD564e53ab5b711e3bf7f2ca518bab8bb47
SHA1991364bb8faa7a8cbae86bccabb709059c561e5c
SHA256da0500a6ab1e9d4e3595ee0ea3802466ba947fb198f51c3049eac4a2898804bf
SHA5121eafbd2db14a762be03a7b23fcae86bf3f90bf8a3dd78d85119cd692afecd8be76ad1e6013ee316fb84f92c81ae2704a6d15432ad13a67c60c6b376d5ee7e56d