Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 04:42
Behavioral task
behavioral1
Sample
cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
8 signatures
150 seconds
General
-
Target
cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe
-
Size
160KB
-
MD5
cb268935f7d7fc36cde396b9957a65f7
-
SHA1
9776927de3d1b442f3662705d3b799a29ce30f52
-
SHA256
0c6e930eee944ce44d1c06c178c33bb8140af0d392b634101d9b98bc38222592
-
SHA512
f794d4d3abdf0eb28a57cbd6f49e0e0d5a9472831df6c3472823e7ae82b3c08ea7f710cb5170621ef6d3106dc577eda35a9fcd412b593d79d3614867fe3a02c5
-
SSDEEP
1536:qEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:hY+4MiIkLZJNAQ9J6v
Score
10/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\56112A6C = "C:\\Users\\Admin\\AppData\\Roaming\\56112A6C\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe 1032 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 1032 winver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exewinver.exedescription pid process target process PID 2316 wrote to memory of 1032 2316 cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe winver.exe PID 2316 wrote to memory of 1032 2316 cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe winver.exe PID 2316 wrote to memory of 1032 2316 cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe winver.exe PID 2316 wrote to memory of 1032 2316 cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe winver.exe PID 2316 wrote to memory of 1032 2316 cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe winver.exe PID 1032 wrote to memory of 1112 1032 winver.exe Explorer.EXE PID 1032 wrote to memory of 1044 1032 winver.exe Dwm.exe PID 1032 wrote to memory of 1060 1032 winver.exe taskhost.exe PID 1032 wrote to memory of 1112 1032 winver.exe Explorer.EXE
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1044
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1060
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb268935f7d7fc36cde396b9957a65f7_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1032