Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe
-
Size
340KB
-
MD5
65b88489f79f8f3960141d3df37fbd4f
-
SHA1
9f19352f8c9d1993e19c3a473eb35b4fa5804657
-
SHA256
7b844252cda7d56d4f23f2e33d31907abf3f1605506153b0d40176553f6ed1de
-
SHA512
6e1f1a2abbfe84712bc952b37b806db334809c1a1b17f47bb2681e3e58402cc79f8889a8ce376ebda6247eb077aa2ecc091b56ea608e367d1919d93624ed909a
-
SSDEEP
6144:8h3VcYa95lebnspAs6xUtnlx4atDaOq5TOtsp0yN90PEk:0Rk5wIp4zatDaOGSXy90b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2388 server.exe 2388 server.exe 2388 server.exe 2388 server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2388 4900 65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe 84 PID 4900 wrote to memory of 2388 4900 65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe 84 PID 4900 wrote to memory of 2388 4900 65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe 84 PID 2388 wrote to memory of 3580 2388 server.exe 56 PID 2388 wrote to memory of 3580 2388 server.exe 56 PID 2388 wrote to memory of 3580 2388 server.exe 56 PID 2388 wrote to memory of 3580 2388 server.exe 56 PID 2388 wrote to memory of 3580 2388 server.exe 56 PID 2388 wrote to memory of 3580 2388 server.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65b88489f79f8f3960141d3df37fbd4f_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5ae55a74b368a620deeafd702bc407e99
SHA1d5c0047a945559b24148c4c1a462f601b21b07cd
SHA25674919c9025ddbff00f5a3d6ae8ce9f3d5e8660472ae56614f3dcfcb5f0661d03
SHA512145bda3066bed2f9418cbefa7acbfd4e04056cb5138f55f5cf9b6a6bd43c665cf4fc8fbdad0e64fbbae8e906d47d5d176678108b61994567e728a57f223d387a