Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 22:00
Behavioral task
behavioral1
Sample
fb423907640c1c4ca122072598c32315_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb423907640c1c4ca122072598c32315_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb423907640c1c4ca122072598c32315_JaffaCakes118.exe
-
Size
57KB
-
MD5
fb423907640c1c4ca122072598c32315
-
SHA1
681cf66f58b97b295c798fcee8d7a01b705446b9
-
SHA256
52ef113b7734e05dcaae6a59d5a208d4d11a3b4dfbf10854fe3e692039e22b85
-
SHA512
78bf16136625168085d8e369711a4cd48cbfef89b1b963136f25b2c8562f9c94f2543b04141cf5c72b70b96137ee8a537b8ea6d037d6ecf6cd391bb9bfde0d87
-
SSDEEP
1536:cuFzK1Tkt1bV/kkAWLUhaSDQB/GK/o2v3DTV/aJy7WYPC:rKOLqkrLc6B/G32vXZnWb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/8-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/8-6-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mapy00044 = "c:\\program files\\Webdialer\\fb423907640c1c4ca122072598c32 -m" fb423907640c1c4ca122072598c32315_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\Webdialer\fb423907640c1c4ca122072598c32 fb423907640c1c4ca122072598c32315_JaffaCakes118.exe File opened for modification \??\c:\program files\Webdialer\fb423907640c1c4ca122072598c32 fb423907640c1c4ca122072598c32315_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 8 fb423907640c1c4ca122072598c32315_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 8 fb423907640c1c4ca122072598c32315_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb423907640c1c4ca122072598c32315_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb423907640c1c4ca122072598c32315_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8