Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe
-
Size
356KB
-
MD5
f7d6afb20a53980765cad31ce15136d0
-
SHA1
f0b8818df021b6c109141040b882701b1e2a78a7
-
SHA256
42221ee298dff0f0c0a48e9bf8551f88a06af510191c347cb2cfd99520095b77
-
SHA512
a975fd421be0a891a717ac44f8361874f8f1a9431bde348df93020a5d25173794ed52e5d605661d8c0d00bc311fa62ce0d38dce143ddca392f967c08fe2e5c96
-
SSDEEP
6144:7vbx8YB+Bta45aXKTjBBH79JBL15ApnLUksKNp89Fc+L:740XG9Lrwnwe9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 Jlp8rBDxwS.exe -
Executes dropped EXE 2 IoCs
pid Process 1144 Jlp8rBDxwS.exe 2660 Jlp8rBDxwS.exe -
Loads dropped DLL 4 IoCs
pid Process 1804 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 1804 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 1804 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 2660 Jlp8rBDxwS.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WWVqMJTdDoqF6iq = "C:\\ProgramData\\5r11h8Yf5T\\Jlp8rBDxwS.exe" f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2796 set thread context of 1804 2796 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 28 PID 1144 set thread context of 2660 1144 Jlp8rBDxwS.exe 30 PID 2660 set thread context of 2564 2660 Jlp8rBDxwS.exe 31 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1804 2796 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 28 PID 2796 wrote to memory of 1804 2796 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 28 PID 2796 wrote to memory of 1804 2796 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 28 PID 2796 wrote to memory of 1804 2796 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 28 PID 2796 wrote to memory of 1804 2796 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 28 PID 2796 wrote to memory of 1804 2796 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 28 PID 1804 wrote to memory of 1144 1804 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 29 PID 1804 wrote to memory of 1144 1804 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 29 PID 1804 wrote to memory of 1144 1804 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 29 PID 1804 wrote to memory of 1144 1804 f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe 29 PID 1144 wrote to memory of 2660 1144 Jlp8rBDxwS.exe 30 PID 1144 wrote to memory of 2660 1144 Jlp8rBDxwS.exe 30 PID 1144 wrote to memory of 2660 1144 Jlp8rBDxwS.exe 30 PID 1144 wrote to memory of 2660 1144 Jlp8rBDxwS.exe 30 PID 1144 wrote to memory of 2660 1144 Jlp8rBDxwS.exe 30 PID 1144 wrote to memory of 2660 1144 Jlp8rBDxwS.exe 30 PID 2660 wrote to memory of 2564 2660 Jlp8rBDxwS.exe 31 PID 2660 wrote to memory of 2564 2660 Jlp8rBDxwS.exe 31 PID 2660 wrote to memory of 2564 2660 Jlp8rBDxwS.exe 31 PID 2660 wrote to memory of 2564 2660 Jlp8rBDxwS.exe 31 PID 2660 wrote to memory of 2564 2660 Jlp8rBDxwS.exe 31 PID 2660 wrote to memory of 2564 2660 Jlp8rBDxwS.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7d6afb20a53980765cad31ce15136d0_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\ProgramData\5r11h8Yf5T\Jlp8rBDxwS.exe"C:\ProgramData\5r11h8Yf5T\Jlp8rBDxwS.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\ProgramData\5r11h8Yf5T\Jlp8rBDxwS.exe"C:\ProgramData\5r11h8Yf5T\Jlp8rBDxwS.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe"C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe" /i:26605⤵PID:2564
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5f7d6afb20a53980765cad31ce15136d0
SHA1f0b8818df021b6c109141040b882701b1e2a78a7
SHA25642221ee298dff0f0c0a48e9bf8551f88a06af510191c347cb2cfd99520095b77
SHA512a975fd421be0a891a717ac44f8361874f8f1a9431bde348df93020a5d25173794ed52e5d605661d8c0d00bc311fa62ce0d38dce143ddca392f967c08fe2e5c96