Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe
-
Size
41KB
-
MD5
6533546b5ce56769d5856854c5c2b1eb
-
SHA1
a61ee6fee49eb9a645cd254c15c370fa8e8c407e
-
SHA256
dd1787e0d0f3b17d4c7d9bd2b9b2597ecba94feb5beada587ffcdc9b8e6479ae
-
SHA512
e679de8db2da62ff9a504b774e455c03dc1f7a6cbefe8e361f8846541d0b2c0a23ea02c6ceb7e1128e266046c400363a7b61f4b36451d40df717754d354ac4d9
-
SSDEEP
768:wqeAZ1VrH2Fm5bG6YmmghuhsMxRYskKGS+hF2vio/QBUs:wq915HuMG6Xhudx1kLV/AQf
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\edfscv\ImagePath = "C:\\Windows\\system32\\fgdfsdf.exe -service" 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1196 fgdfsdf.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\KillMe.bat 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe File created C:\Windows\SysWOW64\bdrrdf.dll fgdfsdf.exe File created C:\Windows\SysWOW64\fgdfsdf.exe 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fgdfsdf.exe 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe File created C:\Windows\SysWOW64\fgdfsdf.exe fgdfsdf.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2384 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe 2384 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe 1196 fgdfsdf.exe 1196 fgdfsdf.exe 1196 fgdfsdf.exe 1196 fgdfsdf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3768 2384 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe 87 PID 2384 wrote to memory of 3768 2384 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe 87 PID 2384 wrote to memory of 3768 2384 6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6533546b5ce56769d5856854c5c2b1eb_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\KillMe.bat2⤵PID:3768
-
-
C:\Windows\SysWOW64\fgdfsdf.exeC:\Windows\SysWOW64\fgdfsdf.exe -service1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD55be1f43bfa04f82a14f1afd4115acb2c
SHA1c19719d12c00e69a088e6766f81fff893e564bb3
SHA256b9000e892324c0609edd2f806c85007e5b9e5b2629a9134ca17c256a0540f5bb
SHA5129b1c1d6c96e6ae0ca01e7156ddd2f9b63d17fcf2337e0826dfbb1563274a89e64ea13220d6b8f151c6331cfc43e6090540a7f9f8d440e6f61e74579bc9d6fc5e
-
Filesize
41KB
MD56533546b5ce56769d5856854c5c2b1eb
SHA1a61ee6fee49eb9a645cd254c15c370fa8e8c407e
SHA256dd1787e0d0f3b17d4c7d9bd2b9b2597ecba94feb5beada587ffcdc9b8e6479ae
SHA512e679de8db2da62ff9a504b774e455c03dc1f7a6cbefe8e361f8846541d0b2c0a23ea02c6ceb7e1128e266046c400363a7b61f4b36451d40df717754d354ac4d9