Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 17:25
Behavioral task
behavioral1
Sample
face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe
Resource
win10v2004-20240412-en
7 signatures
150 seconds
General
-
Target
face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe
-
Size
212KB
-
MD5
face2cfc86cbaaa01b9968133ff62d82
-
SHA1
1b8b0f29d03b14c85feb65ab3a5a864e6ddd9e02
-
SHA256
786b64e2ae3bd75abeab86e3fcb0e5ea84b016ce75504e2fea441d5910deb3eb
-
SHA512
06e79d5b8b87e5e1bd5e701c12adc2f3f5f2287c14d27d6874a8e8cfd24070f34ca2249a0c448ff03d867f57f85db2851ec315c1dedf0669430c9db378d63387
-
SSDEEP
6144:F8S2qLUA6qHfosMcW2XHTlO34KPADymo:F0qLUKfosM2XHBK4Dvo
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1228-0-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\JP595IR86O = "C:\\Users\\Admin\\AppData\\Local\\Temp\\face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe" face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe File created C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1228 face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\face2cfc86cbaaa01b9968133ff62d82_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1228