Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe
-
Size
446KB
-
MD5
0847131e3c0b10cb86932d8fbd8de8c8
-
SHA1
3fbd528d14e9fe373e6081579a8b6ec4a6b57716
-
SHA256
eb43035b49f871547343655754fc84af36c519deef8d57d650ab0a203013e1f4
-
SHA512
12af6bfcf0981040f0c73b7bbbba8ba470a5b741eb986b092708e825509a918ac6c3011d407e402749295793e46c2f464b4f9c09c9cb50ea6aed7c4666c30095
-
SSDEEP
6144:kpUP3aUlHxCfu0PdTCLJ3QsyWrdgk6nbUuEuqg7UP/1SaWRmv:g8xCfvdT83QNIzwvqg7UP/8a
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2788 JekAggiWWHG.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\JekAggiWWHG = "C:\\ProgramData\\JekAggiWWHG.exe" 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JekAggiWWHG.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 JekAggiWWHG.exe -
resource yara_rule behavioral1/memory/2788-12-0x0000000000600000-0x0000000000676000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JekAggiWWHG.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Download 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe 2788 JekAggiWWHG.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2788 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2788 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2788 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2788 2648 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0847131e3c0b10cb86932d8fbd8de8c8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2648 -
C:\ProgramData\JekAggiWWHG.exe"C:\ProgramData\JekAggiWWHG.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD50847131e3c0b10cb86932d8fbd8de8c8
SHA13fbd528d14e9fe373e6081579a8b6ec4a6b57716
SHA256eb43035b49f871547343655754fc84af36c519deef8d57d650ab0a203013e1f4
SHA51212af6bfcf0981040f0c73b7bbbba8ba470a5b741eb986b092708e825509a918ac6c3011d407e402749295793e46c2f464b4f9c09c9cb50ea6aed7c4666c30095