Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-04-2024 01:38
Behavioral task
behavioral1
Sample
efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe
-
Size
661KB
-
MD5
efffa4a15e671daf77e1cdf14a26c153
-
SHA1
176aac5051ac2a38eccbb98bcb029771b0bef18d
-
SHA256
20eeb552de82c310d472f1d8c175c668c1af67b82fad21e1416e20fe006613d6
-
SHA512
b965196e9f34df287f0623edb6da9e1238b3e3adee24c1421ac5a47e394ce861a2fffb59998e0bb75c858911e81a04d5e6f5d60226528acc6bbe48fa157df159
-
SSDEEP
12288:eSI2A2u/WGo+n31k1OxVGL5xLz7MGuU/YuLW4htuM7Cy90Xg:PI72u/WGo41kSGtx37rYuLoyYg
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3012-0-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-3-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-4-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-10-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-11-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-13-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-14-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-15-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/3012-16-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/920-17-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/920-21-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/920-22-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/920-28-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/920-29-0x0000000000E90000-0x0000000001050000-memory.dmp upx behavioral1/memory/920-30-0x0000000000E90000-0x0000000001050000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe = "11001" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe = "11001" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90} efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F} efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\ = "Setup.Application" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR\ efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe\"" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ = "Setup.Application" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\ = "Setup" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS\ = "0" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe\"" efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 920 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3012 wrote to memory of 920 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 32 PID 3012 wrote to memory of 920 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 32 PID 3012 wrote to memory of 920 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 32 PID 3012 wrote to memory of 920 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 32 PID 3012 wrote to memory of 920 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 32 PID 3012 wrote to memory of 920 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 32 PID 3012 wrote to memory of 920 3012 efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efffa4a15e671daf77e1cdf14a26c153_JaffaCakes118.exe" /adm /recovermode2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:920
-