Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 04:45
Behavioral task
behavioral1
Sample
b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe
Resource
win10v2004-20240226-en
9 signatures
150 seconds
General
-
Target
b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe
-
Size
34KB
-
MD5
b00b718e3aec104f72799f1b2c3b5e79
-
SHA1
7e717b8cab46382f5b511ac558d11d7796435819
-
SHA256
dc2358930ad854be85980aa2c7631cb8a84452ab43635d4ddb7c955b5cb91e2a
-
SHA512
8bf590f969c6d9498692de9ee51bf6d6ae80856c9940bb2d8789e3e62612d9bb9503c728c1e6d008a8af3e11a0699343ac84bc4c62ff4e9a9e668367f07e14a4
-
SSDEEP
768:np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:npYoX58z1uirL98xMWnT0OQ9J2
Score
10/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2688-0-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\DD025902 = "C:\\Users\\Admin\\AppData\\Roaming\\DD025902\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe 2824 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2824 winver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exewinver.exedescription pid process target process PID 2688 wrote to memory of 2824 2688 b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe winver.exe PID 2688 wrote to memory of 2824 2688 b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe winver.exe PID 2688 wrote to memory of 2824 2688 b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe winver.exe PID 2688 wrote to memory of 2824 2688 b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe winver.exe PID 2688 wrote to memory of 2824 2688 b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe winver.exe PID 2824 wrote to memory of 1248 2824 winver.exe Explorer.EXE PID 2824 wrote to memory of 1116 2824 winver.exe taskhost.exe PID 2824 wrote to memory of 1168 2824 winver.exe Dwm.exe PID 2824 wrote to memory of 1248 2824 winver.exe Explorer.EXE
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b00b718e3aec104f72799f1b2c3b5e79_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2824