Analysis
-
max time kernel
40s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe
-
Size
70KB
-
MD5
c0de2132b437d1228bac06968d15273d
-
SHA1
58617e907a56d5c7709927348e10ef87821835d7
-
SHA256
84a7b5bc0070b8b192a84e948fc76991032ab6df5abc355203ead6021b996fa3
-
SHA512
d24bdefd098c5af8199ccef80663be170d09b6608762064bb9c8497422ca376b1aaee6f595d9d596f1fb25cb63e19ee5bc28d66c226f60fb5befdce7e138dd16
-
SSDEEP
1536:AVy3jzVFTTGGBzq4wcm5NTRtLtNDWvFVx19y03cU3q65T8T2RHD7vea2:hfvGn4wlTRdDWJ1Pw65ZfvF2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 helperpnew.exe -
Executes dropped EXE 3 IoCs
pid Process 2628 helperpnew.exe 2640 pnew.exe 2472 helperpnew.exe -
Loads dropped DLL 6 IoCs
pid Process 1056 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 1056 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 2628 helperpnew.exe 2628 helperpnew.exe 2640 pnew.exe 2640 pnew.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe" c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe" c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Windows\\SysWOW64\\pnew.exe" pnew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Windows\\SysWOW64\\pnew.exe" pnew.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\pnew.exe helperpnew.exe File opened for modification C:\Windows\SysWOW64\helperpnew.exe c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe File created C:\Windows\SysWOW64\helperpnew.exe c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe File created C:\Windows\SysWOW64\pnew.exe helperpnew.exe File opened for modification C:\Windows\SysWOW64\pnew.exe helperpnew.exe File opened for modification C:\Windows\SysWOW64\helperpnew.exe pnew.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language helperpnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnew.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2628 1056 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 29 PID 1056 wrote to memory of 2628 1056 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 29 PID 1056 wrote to memory of 2628 1056 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 29 PID 1056 wrote to memory of 2628 1056 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 29 PID 2628 wrote to memory of 2640 2628 helperpnew.exe 30 PID 2628 wrote to memory of 2640 2628 helperpnew.exe 30 PID 2628 wrote to memory of 2640 2628 helperpnew.exe 30 PID 2628 wrote to memory of 2640 2628 helperpnew.exe 30 PID 2640 wrote to memory of 2472 2640 pnew.exe 31 PID 2640 wrote to memory of 2472 2640 pnew.exe 31 PID 2640 wrote to memory of 2472 2640 pnew.exe 31 PID 2640 wrote to memory of 2472 2640 pnew.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\helperpnew.exeC:\Users\Admin\AppData\Local\Temp\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\pnew.exeC:\Windows\system32\pnew.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\helperpnew.exeC:\Windows\SysWOW64\pnew.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5aaada8f721ddfe814b3869d3e2100d66
SHA1e5b64e46009e30e5749060162da9fe9dc8bb7640
SHA2568d97eb9865ec643830fca863257b396e5a62253b696fb0680499cdb24d2c80e7
SHA512fe47831739407e01a1e8a406b5b6598dfc32bbd32635088ad5be003ba08136c7631ff9372c2916c5d664e52c65dab1f7b65c17bc29363f5f0f0aabce35c1a58d
-
Filesize
70KB
MD5c0de2132b437d1228bac06968d15273d
SHA158617e907a56d5c7709927348e10ef87821835d7
SHA25684a7b5bc0070b8b192a84e948fc76991032ab6df5abc355203ead6021b996fa3
SHA512d24bdefd098c5af8199ccef80663be170d09b6608762064bb9c8497422ca376b1aaee6f595d9d596f1fb25cb63e19ee5bc28d66c226f60fb5befdce7e138dd16