Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe
-
Size
73KB
-
MD5
f67efca3e64a257311b8a2e278128cce
-
SHA1
78faa967d50f866f63b257c0829ef2539aeef3c9
-
SHA256
7d815f06185e7a5499b37e426c66191f2174d4e82b2f669af0a168633ce17b16
-
SHA512
449730d00098c9cb7113411684c4776292c8732936c9c20b5704b72a7dac6589d1d6c115d12f732d959bb3326c65c98d6a1b19d5d0edb039f09049157511288f
-
SSDEEP
1536:W45qNJhWBZ5xaq2VXBRAIYO+MElTnz8MdQqzupKBVQB+/t9o2hNSAlvZJR:W/FKxaLRSO+MEnzD4KBaBw9lhNFhR
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\B831406A9770.dll f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe File opened for modification C:\Windows\Debug\B831406A9770.dll f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32\ = "C:\\Windows\\Debug\\B831406A9770.dll" f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32\ThrEaDiNgModEL = "aPaRTmEnT" f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117} f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\ = "fsvdf" f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2908 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 28 PID 2648 wrote to memory of 2908 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 28 PID 2648 wrote to memory of 2908 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 28 PID 2648 wrote to memory of 2908 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 28 PID 2648 wrote to memory of 2640 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2640 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2640 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 32 PID 2648 wrote to memory of 2640 2648 f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f67efca3e64a257311b8a2e278128cce_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2908
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2640
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD508409feff760da097349273e3c396884
SHA1d530f5a50d2bd76d8c7c97343f806db11e78b88a
SHA25613cb6eb5d95d299ce36973a31633fa0d73394fe1a51d61373d4f7efa3cb80d4c
SHA5124ef729df5f805ca0007c618bde027ee3243be34bf9c3a66a5465299c1910bf0deddc9d8a08cfd0cf6973012bfe6c3cf109faa80fee94ed4fa12a232f5a16f54d
-
Filesize
53B
MD58d856891d061488c8fca4e071c7db6eb
SHA100d98a74477c27281a8e38ffd8a40c08e51b341d
SHA25629f9eed1ad480b91ae4e33b6378e5f598c61bdf607f7363d099701c45e40f5ac
SHA512ed43963addefba107fbd4ab6d9265118f99d48b8af66dd44cc3a5d5842e3965116b5af9ba7537d90f884029ed57fa0f67aafc1625fe26168b11718eda35ea531
-
Filesize
154KB
MD5e23be3cce6ab7c704e9b91a58824de81
SHA1e5f4494fbe79834c25097b8d241fcf169973c49a
SHA25681ac9c1c1d271f5e12d262e4351242a42da7b3857ca2a9036f200e6e2895062e
SHA5124023f4d8a7e5599afd106a59cb53f6fe0db1aa464625fc66861a80993733f1f16cfc8c2e974c4a64cf576f0f3a0262130343bdb9b2fb3771ff8715c10b117f3e