Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 10:07
Behavioral task
behavioral1
Sample
b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe
Resource
win10v2004-20240226-en
10 signatures
150 seconds
General
-
Target
b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe
-
Size
34KB
-
MD5
b58ab7caed0593af648b127b6d25e7cf
-
SHA1
199e3f423cb5a1fba87b21c5f7ecc8f5b63478f0
-
SHA256
985a67a8d630b39234fe0b21d492429cf4d38a8c8c6e413b4ce333027f0a801c
-
SHA512
d1e6cd3cecab1271e541861f6f9622e566baed63f0011237f61528d99fb87f3d14684737bb1720859d7460c0803f9c289be914c1e39b223da4bcb6911a0f3cf6
-
SSDEEP
768:Xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:XpYoX58z1uirL98xMWnT0OQ9J2
Score
10/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2856-0-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\73B59A70 = "C:\\Users\\Admin\\AppData\\Roaming\\73B59A70\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe 2532 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2532 winver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exewinver.exedescription pid process target process PID 2856 wrote to memory of 2532 2856 b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe winver.exe PID 2856 wrote to memory of 2532 2856 b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe winver.exe PID 2856 wrote to memory of 2532 2856 b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe winver.exe PID 2856 wrote to memory of 2532 2856 b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe winver.exe PID 2856 wrote to memory of 2532 2856 b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe winver.exe PID 2532 wrote to memory of 1300 2532 winver.exe Explorer.EXE PID 2532 wrote to memory of 1128 2532 winver.exe taskhost.exe PID 2532 wrote to memory of 1188 2532 winver.exe Dwm.exe PID 2532 wrote to memory of 1300 2532 winver.exe Explorer.EXE
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b58ab7caed0593af648b127b6d25e7cf_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2532