Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe
-
Size
298KB
-
MD5
65c08dc64d5e4840f7db4177f124d1a6
-
SHA1
80ea227f8ca837a6a4a7e0db92dc9ab8d63dc731
-
SHA256
f4668d2aaff6b2225580ce1a09e38414850c4ecfe305fa5b3e2e75eaa780440a
-
SHA512
5bac416a34e4721faf65d41edeac0332d1474c2b9217e4318fe9f5340526ed3cbe0e6ec6459fe7620286db04206b5c9247aa4535210da0060af288b99ed956ab
-
SSDEEP
6144://0uoOiEdcv2vswOb815E8PcEYLrS/NsXIFVA3hkuFIs:/J2Gg2kRmq8PKS/2XIFV6fn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2060 WINDOW~1.EXE -
Loads dropped DLL 1 IoCs
pid Process 2296 65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2060 2296 65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2060 2296 65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2060 2296 65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe 30 PID 2296 wrote to memory of 2060 2296 65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65c08dc64d5e4840f7db4177f124d1a6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE2⤵
- Executes dropped EXE
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
290KB
MD599bf24013acf6d5931a2feaaa0a60f56
SHA1decab29e7b3c744e9eca105345f7f1e2fe5e9959
SHA256f698b982bfb3e24b856d231b1674b7c38075e2fadd6b907825eca1986164907d
SHA5125344180958f2306371383c05b617389fb4ab6c42b6d0252a89095fc4e81bd199dc8aaea4792f1110017c0abf31137440990da3dfba5ddcc7cc623767dbe84d72