Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe
-
Size
7.3MB
-
MD5
ea9ae93381712a1638a1e14e24ea9b07
-
SHA1
59156525a8fb71a7e5281a98f17ebdf966b72294
-
SHA256
6eced82116ade4fe643867f4ccd36b479c32a99144bc3b518f7f408a69d9b0c0
-
SHA512
ba76b8844b82513e3d3a1003fd9ff063c60c1814ac956b47dbc9deef20c154b5cd82a27d2d60ac16932ead3758d5430f07281a540ad93a6df693c1ef64fcf6ef
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rcrvoQG+yrY+Fr/rcr/rY+qQG+yrY+Fr/rErY+Fr/rcrvoa:EcKHnka
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2704 et.exe -
Loads dropped DLL 2 IoCs
pid Process 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main et.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 et.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2704 et.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2704 et.exe 2704 et.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2704 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 28 PID 2512 wrote to memory of 2704 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 28 PID 2512 wrote to memory of 2704 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 28 PID 2512 wrote to memory of 2704 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 28 PID 2512 wrote to memory of 2704 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 28 PID 2512 wrote to memory of 2704 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 28 PID 2512 wrote to memory of 2704 2512 ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\et.exeC:\Users\Admin\AppData\Local\Temp\et.exe -run C:\Users\Admin\AppData\Local\Temp\ea9ae93381712a1638a1e14e24ea9b07_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.0MB
MD55c7ba44dfad3ddf3c579e8c35c98a71d
SHA1c5b6ac7dfb84af4e46fbfa29b64beb94459d1d79
SHA2564f57b99a6a4700edee88822b0c3fec59afe44f15ad49e1bbde99e219c9a54804
SHA512c27e41feece589f0f58654ad52e7b96d6372a286f08c96f74ba9cb4d40a271add6e5ccb02f4aef734f80c75dc7f74aded3b33b97eb2bbcda159dd5b368c78d7a