Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 04:42
Static task
static1
Behavioral task
behavioral1
Sample
f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe
-
Size
128KB
-
MD5
f2b7294aeb242d40da38e55432663699
-
SHA1
dbb891d0eefb6826e1477f363188366679b8adc8
-
SHA256
7ce0525a030a7fb7fba58bb9a72afb50028918547ed203dc4cc30d8904a0e3d1
-
SHA512
e1a0a25cbf7ef1221473d6033d49db5a4af5b71f13a83fa0306eeee555b48f4a295aabe388d6b0249ce7270081fb4a4608a55857128e776ac9cbe437b5973610
-
SSDEEP
3072:9Ybt6GNvYvwcz9gNvcMoY4sXDkOD6yM/w6:cNvYw9chY1YfyM/w6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1828 taskhost.exe 4904 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2720 set thread context of 3432 2720 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 83 PID 1828 set thread context of 4904 1828 taskhost.exe 88 -
Program crash 2 IoCs
pid pid_target Process procid_target 4524 2720 WerFault.exe 82 180 1828 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2720 wrote to memory of 3432 2720 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 83 PID 2720 wrote to memory of 3432 2720 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 83 PID 2720 wrote to memory of 3432 2720 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 83 PID 2720 wrote to memory of 3432 2720 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 83 PID 2720 wrote to memory of 3432 2720 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 83 PID 3432 wrote to memory of 1828 3432 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 86 PID 3432 wrote to memory of 1828 3432 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 86 PID 3432 wrote to memory of 1828 3432 f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe 86 PID 1828 wrote to memory of 4904 1828 taskhost.exe 88 PID 1828 wrote to memory of 4904 1828 taskhost.exe 88 PID 1828 wrote to memory of 4904 1828 taskhost.exe 88 PID 1828 wrote to memory of 4904 1828 taskhost.exe 88 PID 1828 wrote to memory of 4904 1828 taskhost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\f2b7294aeb242d40da38e55432663699_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f2b7294aeb242d40da38e55432663699_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 2964⤵
- Program crash
PID:180
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2962⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2720 -ip 27201⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1828 -ip 18281⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5666bbb92dfd9fc9ab2e654e18dc4bc90
SHA19767d22ab5fba3cf381c3970cb3c277d261f6abe
SHA256d20f7b770f1ffb1776fe22d134786e03c36d187b9ccfa3474a875df593ded4d8
SHA5121ef1011f42f6bd81ab4656c073db7552dede6f018eb8938f886129aee5a21581fed3c3e28c947c504ce7fa449d1d809682b087f1de08c6de12245be8185c5f5d