Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 10:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe
-
Size
69KB
-
MD5
e73863406077460ce69b9b025670f8f9
-
SHA1
18ed6cb24c94b1c090b1bd54c8fd4344708a5bd5
-
SHA256
39c73c4e18d8da48ffec11261d85b1a181fcafa74f3256ca63dd42923ddf8483
-
SHA512
e6c894f8d59804f84e29daa2b3bf87eda39585ae11d6761449b6a52428e5146fc9653be31f59f910f0cf950dc64c0b2d640e89aa8ece12f278d7e7a5aef64c40
-
SSDEEP
768:GgCIGhxgLa1J+9ZWDnBwPQdCgVpudGnsi94+WW/r0va0Mvrr4Ink+JU2zbH3vZLP:GVLheLaUZW0tgVp2+WQrtcILprBLYk
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\msconfig.dat" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 2456 explorer.exe 1140 Explorer.EXE 2596 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2896 set thread context of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1140 Explorer.EXE 1140 Explorer.EXE 1140 Explorer.EXE 1140 Explorer.EXE 2576 ctfmon.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1140 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 svchost.exe 2596 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2896 wrote to memory of 2236 2896 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 28 PID 2236 wrote to memory of 2456 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2456 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2456 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 29 PID 2236 wrote to memory of 2456 2236 e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe 29 PID 2456 wrote to memory of 1140 2456 explorer.exe 20 PID 1140 wrote to memory of 2596 1140 Explorer.EXE 30 PID 1140 wrote to memory of 2596 1140 Explorer.EXE 30 PID 1140 wrote to memory of 2596 1140 Explorer.EXE 30 PID 1140 wrote to memory of 2596 1140 Explorer.EXE 30 PID 1140 wrote to memory of 2596 1140 Explorer.EXE 30 PID 2596 wrote to memory of 2576 2596 svchost.exe 31 PID 2596 wrote to memory of 2576 2596 svchost.exe 31 PID 2596 wrote to memory of 2576 2596 svchost.exe 31 PID 2596 wrote to memory of 2576 2596 svchost.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e73863406077460ce69b9b025670f8f9_JaffaCakes118.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2456
-
-
-
-
C:\Windows\syswow64\svchost.exe"C:\Windows\syswow64\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe3⤵
- Suspicious use of FindShellTrayWindow
PID:2576
-
-