Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe
-
Size
148KB
-
MD5
f6bb86f44eb6531473d55b017497ac2d
-
SHA1
4aa26b2bb1362b3b20519f7e1b6855776e68826a
-
SHA256
422e9ddaee6d755375b41fc8e3f1b406b2ad2019b809533098017536785907c9
-
SHA512
57d0314d60d42484fb28f7ab13ce454a43dcc65acc95047d0dd2c07596375ae58c8efaefdc8f9a3431309bc85d8e28531050c8f68ac499369865ce92bfad394f
-
SSDEEP
3072:Gd3Z7stZMRYPTB8ilfPSGSlCunRDSMdV:GdpcMR+F8aSlCWRDS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2628 svchost.exe 2888 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2248 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 2248 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 2628 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Desktop = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Desktop = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3060 set thread context of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 2628 set thread context of 2888 2628 svchost.exe 30 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2248 3060 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2628 2248 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2628 2248 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2628 2248 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 29 PID 2248 wrote to memory of 2628 2248 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 29 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30 PID 2628 wrote to memory of 2888 2628 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
PID:2888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5f6bb86f44eb6531473d55b017497ac2d
SHA14aa26b2bb1362b3b20519f7e1b6855776e68826a
SHA256422e9ddaee6d755375b41fc8e3f1b406b2ad2019b809533098017536785907c9
SHA51257d0314d60d42484fb28f7ab13ce454a43dcc65acc95047d0dd2c07596375ae58c8efaefdc8f9a3431309bc85d8e28531050c8f68ac499369865ce92bfad394f