Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe
-
Size
148KB
-
MD5
f6bb86f44eb6531473d55b017497ac2d
-
SHA1
4aa26b2bb1362b3b20519f7e1b6855776e68826a
-
SHA256
422e9ddaee6d755375b41fc8e3f1b406b2ad2019b809533098017536785907c9
-
SHA512
57d0314d60d42484fb28f7ab13ce454a43dcc65acc95047d0dd2c07596375ae58c8efaefdc8f9a3431309bc85d8e28531050c8f68ac499369865ce92bfad394f
-
SSDEEP
3072:Gd3Z7stZMRYPTB8ilfPSGSlCunRDSMdV:GdpcMR+F8aSlCWRDS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1220 svchost.exe 224 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Desktop = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Desktop = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3640 set thread context of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 1220 set thread context of 224 1220 svchost.exe 95 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 3640 wrote to memory of 4792 3640 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 91 PID 4792 wrote to memory of 1220 4792 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 92 PID 4792 wrote to memory of 1220 4792 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 92 PID 4792 wrote to memory of 1220 4792 f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe 92 PID 1220 wrote to memory of 224 1220 svchost.exe 95 PID 1220 wrote to memory of 224 1220 svchost.exe 95 PID 1220 wrote to memory of 224 1220 svchost.exe 95 PID 1220 wrote to memory of 224 1220 svchost.exe 95 PID 1220 wrote to memory of 224 1220 svchost.exe 95 PID 1220 wrote to memory of 224 1220 svchost.exe 95 PID 1220 wrote to memory of 224 1220 svchost.exe 95 PID 1220 wrote to memory of 224 1220 svchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6bb86f44eb6531473d55b017497ac2d_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
PID:224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5f6bb86f44eb6531473d55b017497ac2d
SHA14aa26b2bb1362b3b20519f7e1b6855776e68826a
SHA256422e9ddaee6d755375b41fc8e3f1b406b2ad2019b809533098017536785907c9
SHA51257d0314d60d42484fb28f7ab13ce454a43dcc65acc95047d0dd2c07596375ae58c8efaefdc8f9a3431309bc85d8e28531050c8f68ac499369865ce92bfad394f