Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 14:20
Static task
static1
Behavioral task
behavioral1
Sample
f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe
-
Size
313KB
-
MD5
f82e0046a08422fb7438fb9b44d6c950
-
SHA1
b639f8074eceac8fe5c3690ea5b80e5d1a6f49b0
-
SHA256
16d12057b55851d2cdf591d4b76ca2369ac3ffa9f919e0affbe6f022ca072366
-
SHA512
a0f283c693b8453cabee6f9df3a47944453963ce0684755cf65a1364dab7029cdf10afe908eccaef18ba933f468e84d64c2296ce0cc2b485db64137057ba5c83
-
SSDEEP
6144:SoKnaembZf9AVfeYc0gkF5Xf6QY/6cATAQLh3++i2Wgwj:9KQx9k7XMD/nxt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2300 seyzfu.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\{58C936C8-997F-AD4E-D42C-E216E5D1C10B} = "C:\\Users\\Admin\\AppData\\Roaming\\Nalus\\seyzfu.exe" seyzfu.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe 2300 seyzfu.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2300 2960 f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2300 2960 f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2300 2960 f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe 28 PID 2960 wrote to memory of 2300 2960 f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe 28 PID 2300 wrote to memory of 1120 2300 seyzfu.exe 19 PID 2300 wrote to memory of 1120 2300 seyzfu.exe 19 PID 2300 wrote to memory of 1120 2300 seyzfu.exe 19 PID 2300 wrote to memory of 1120 2300 seyzfu.exe 19 PID 2300 wrote to memory of 1120 2300 seyzfu.exe 19 PID 2300 wrote to memory of 1180 2300 seyzfu.exe 20 PID 2300 wrote to memory of 1180 2300 seyzfu.exe 20 PID 2300 wrote to memory of 1180 2300 seyzfu.exe 20 PID 2300 wrote to memory of 1180 2300 seyzfu.exe 20 PID 2300 wrote to memory of 1180 2300 seyzfu.exe 20 PID 2300 wrote to memory of 1216 2300 seyzfu.exe 21 PID 2300 wrote to memory of 1216 2300 seyzfu.exe 21 PID 2300 wrote to memory of 1216 2300 seyzfu.exe 21 PID 2300 wrote to memory of 1216 2300 seyzfu.exe 21 PID 2300 wrote to memory of 1216 2300 seyzfu.exe 21 PID 2300 wrote to memory of 2960 2300 seyzfu.exe 27 PID 2300 wrote to memory of 2960 2300 seyzfu.exe 27 PID 2300 wrote to memory of 2960 2300 seyzfu.exe 27 PID 2300 wrote to memory of 2960 2300 seyzfu.exe 27 PID 2300 wrote to memory of 2960 2300 seyzfu.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f82e0046a08422fb7438fb9b44d6c950_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Roaming\Nalus\seyzfu.exe"C:\Users\Admin\AppData\Roaming\Nalus\seyzfu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
313KB
MD5b66f01367b8086cc2c7b8a7661364fb4
SHA18acf231c0ffd10326d68e99822833c5767679b96
SHA256ffbf91f5526048a9bc9ec270fa3b064dc7a9a4e3620be9b8bd1cb48125ac437a
SHA512ba0aa60dc82e7faf1f4e234a7193097955168ebb540a2f09490dd79ecb7c961a0f9dd75352e772b0f14070595c106e6601ba2c919716ae38415f0943b170f942