Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 14:02
Behavioral task
behavioral1
Sample
6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe
-
Size
918KB
-
MD5
6374daa20a3c6eb253a2b14a76510c06
-
SHA1
cc853d739f01b6a4658dd04e23136ab7b8a914b2
-
SHA256
5b49d8d6a695162d5419ff7c4fb66b675cc3639898516237d7e84040790324bc
-
SHA512
41f89aa74d27ca8a83de14bfe30c04bdd6e1b8954c5ce12fed107cf8facb8a24db2c6cb2ada00d15e2decc1edc69848ef9aa239ca2b70c9418ba1df25aa67128
-
SSDEEP
24576:NE8NZMC425ttdFvG2TiLqPTCgJuGpwKkvefRqlcXduCZS7Tskji:NxjXdFu0CgJBpXkvefq2uwS7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 42126955.exe -
Loads dropped DLL 3 IoCs
pid Process 3008 cmd.exe 2904 42126955.exe 2904 42126955.exe -
resource yara_rule behavioral1/memory/2904-24-0x0000000001000000-0x0000000001572000-memory.dmp upx behavioral1/files/0x0007000000012119-23.dat upx behavioral1/memory/2716-0-0x0000000001000000-0x0000000001572000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118 = "\"C:\\Users\\Admin\\AppData\\Local\\42126955.exe\" 0 32 " 6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\42126955 = "\"C:\\Users\\Admin\\AppData\\Local\\42126955.exe\" 0 28 " 42126955.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2888 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2904 42126955.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe 2904 42126955.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3008 2716 6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe 30 PID 2716 wrote to memory of 3008 2716 6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe 30 PID 2716 wrote to memory of 3008 2716 6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe 30 PID 2716 wrote to memory of 3008 2716 6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2888 3008 cmd.exe 32 PID 3008 wrote to memory of 2888 3008 cmd.exe 32 PID 3008 wrote to memory of 2888 3008 cmd.exe 32 PID 3008 wrote to memory of 2888 3008 cmd.exe 32 PID 3008 wrote to memory of 2904 3008 cmd.exe 33 PID 3008 wrote to memory of 2904 3008 cmd.exe 33 PID 3008 wrote to memory of 2904 3008 cmd.exe 33 PID 3008 wrote to memory of 2904 3008 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\110949.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 6374daa20a3c6eb253a2b14a76510c06_JaffaCakes118 /f3⤵
- Modifies registry key
PID:2888
-
-
C:\Users\Admin\AppData\Local\42126955.exeC:\Users\Admin\AppData\Local\42126955.exe -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
918KB
MD56374daa20a3c6eb253a2b14a76510c06
SHA1cc853d739f01b6a4658dd04e23136ab7b8a914b2
SHA2565b49d8d6a695162d5419ff7c4fb66b675cc3639898516237d7e84040790324bc
SHA51241f89aa74d27ca8a83de14bfe30c04bdd6e1b8954c5ce12fed107cf8facb8a24db2c6cb2ada00d15e2decc1edc69848ef9aa239ca2b70c9418ba1df25aa67128
-
Filesize
438B
MD5b281c736a3aca05e0fb2d230aaa52382
SHA15bb9c0f106e9d7302fc6226e95feefe377ce833d
SHA25620017afc9caa90cafa97a122e609c80a43861d76907b06a0bbb319e9459553c3
SHA512e7dab762f001b37dab44bffd9f326af2d2e09f16252b834e8798ee39796e0f616288fb94f12718c80264fbf9ae3c2abfad11f129e2498482473964b650c8ad15