Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 10:08 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe
-
Size
189KB
-
MD5
f7c5c1bdc864f26de17d3476cdad2afc
-
SHA1
b27ad10df04b9183473cc351887e30f5b5d74d6a
-
SHA256
50fc7cf932afde372c99253d7c377e9b520051641577a8ca53a0c32f4bfa16c9
-
SHA512
7f55c1b8d474786328d0545e8b6a0fbf8963cc57f986a312d9e6b7f910a758553b9fc33e545466e130300ab8c298f6e2faf1d9c0554ec5ac3da335ebf80dcb32
-
SSDEEP
3072:ocUcm0X3qDOUwUNvo8Hj/64qDuibRsksL7I:ocUK3qDpvTT6LDuib2PA
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4644 sesdessecetra.exe 3396 sesdessecetra.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1940 set thread context of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 4644 set thread context of 3396 4644 sesdessecetra.exe 93 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 4644 sesdessecetra.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1940 wrote to memory of 1168 1940 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 91 PID 1168 wrote to memory of 4644 1168 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 92 PID 1168 wrote to memory of 4644 1168 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 92 PID 1168 wrote to memory of 4644 1168 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 92 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93 PID 4644 wrote to memory of 3396 4644 sesdessecetra.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"4⤵
- Executes dropped EXE
PID:3396
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3896 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:3104
Network
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Request23.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttux.shannen.ccIN AResponsetux.shannen.ccIN A199.2.137.20
-
Remote address:8.8.8.8:53Request20.137.2.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request17.143.109.104.in-addr.arpaIN PTRResponse17.143.109.104.in-addr.arpaIN PTRa104-109-143-17deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestfghfg.translate-google-cache.comIN AResponsefghfg.translate-google-cache.comIN A199.2.137.20
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Request18.24.18.2.in-addr.arpaIN PTRResponse18.24.18.2.in-addr.arpaIN PTRa2-18-24-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
Remote address:8.8.8.8:53Request25.73.42.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesturcdw.zavoddebila.comIN AResponse
-
46 B 40 B 1 1
-
1.2kB 52 B 12 1
-
46 B 40 B 1 1
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 252 B 7 6
-
906 B 212 B 7 5
-
906 B 212 B 7 5
-
860 B 172 B 6 4
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
138 B 256 B 2 2
DNS Request
0.205.248.87.in-addr.arpa
DNS Request
urcdw.zavoddebila.com
-
72 B 158 B 1 1
DNS Request
23.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
60 B 76 B 1 1
DNS Request
tux.shannen.cc
DNS Response
199.2.137.20
-
71 B 129 B 1 1
DNS Request
20.137.2.199.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
17.143.109.104.in-addr.arpa
-
78 B 94 B 1 1
DNS Request
fghfg.translate-google-cache.com
DNS Response
199.2.137.20
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
69 B 131 B 1 1
DNS Request
18.24.18.2.in-addr.arpa
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
-
70 B 156 B 1 1
DNS Request
25.73.42.20.in-addr.arpa
-
67 B 140 B 1 1
DNS Request
urcdw.zavoddebila.com
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5f7c5c1bdc864f26de17d3476cdad2afc
SHA1b27ad10df04b9183473cc351887e30f5b5d74d6a
SHA25650fc7cf932afde372c99253d7c377e9b520051641577a8ca53a0c32f4bfa16c9
SHA5127f55c1b8d474786328d0545e8b6a0fbf8963cc57f986a312d9e6b7f910a758553b9fc33e545466e130300ab8c298f6e2faf1d9c0554ec5ac3da335ebf80dcb32