Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe
-
Size
8.6MB
-
MD5
ea6a4d1280bdfbbee4d15668ae50781a
-
SHA1
23c494fc8e7e010c80f34973eac1f57c94ff6760
-
SHA256
757231d21461949d1c6d6127d98f0be2f786f5d30a93bfdc18ec9c9ab9a91c7b
-
SHA512
89360b24f56735bb69d53d8f9a33459be73b1de4ae1c51272986dfe9ef839bfdcb1fdd9c8f4b9436415ba289015935dc7f42c65161bfa6fdf4854f048deb4741
-
SSDEEP
196608:+hkw/Zs+XYpGyYMSjvf2JbGeNmslKJyBBEEE++CmZYOo+EEEEEEEBBBBBBmmmmmO:+nPXYpGyYMSjvf2JbGeNmwKgBBEEE++K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2832 tuto.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avg = "C:\\Arquivos de programas\\avg.exe" ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\System32\\svchosts.exe" ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\PLUG.SYS ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchosts.exe ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4032 ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2948 4032 ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe 97 PID 4032 wrote to memory of 2948 4032 ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe 97 PID 4032 wrote to memory of 2948 4032 ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe 97 PID 2948 wrote to memory of 2832 2948 cmd.exe 99 PID 2948 wrote to memory of 2832 2948 cmd.exe 99 PID 2948 wrote to memory of 2832 2948 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea6a4d1280bdfbbee4d15668ae50781a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\cmd.execmd /k C:\tuto.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\tuto.exeC:\tuto.exe3⤵
- Executes dropped EXE
PID:2832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2228 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5251b9e5ea854eca172eb5a1ea480c718
SHA1f2d3a641f762ebafce3fe60ba1bf764cd2a6bbec
SHA2564ea747bcd91bc5fc5025b7eb4d4cbba6672a00361285550cb4ca55ad57c95337
SHA512a850de833b3744d31ded0e72549b16614cea9f66a2c989505914de4600c4ffcde842a658d629e0980586cb2c424c3c946e148051a6c82f6ae987da8202d0f8bd