Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 18:44
Behavioral task
behavioral1
Sample
faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe
-
Size
259KB
-
MD5
faef48db08888e05b08bde38509df4c1
-
SHA1
b21d9a22c33b332a5a54a419d575a66562ef59b0
-
SHA256
2d51bce661263c7bf8b93dbecee39b557daf57506c675cd7786621922ab4a8d6
-
SHA512
f40e8f80b18f115473ed32ad69f7037bc9555286bf09667d57ec80291ec9965f3fb95f21d25ceb7ef1d15eb61dce5d9ec988d84e7b966049d6fee06e409db3cd
-
SSDEEP
6144:aKM3BeIMlhsZnB+MJpg8cjW1PVYSMtYsrGmbMnNcS:aKaoIMYq2pgc+3Jb6B
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2244-6-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2836-0-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2244-8-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2244-10-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2836-7-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2244-12-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2244-11-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/files/0x0007000000015d24-14.dat upx behavioral1/memory/2244-15-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\BcreqtF = "c:\\ProgramData\\PkemgeH\\LfqjmlI\\BcreqtF.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2836 set thread context of 2244 2836 faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe 28 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2244 2836 faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2244 2836 faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2244 2836 faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2244 2836 faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2244 2836 faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe 28 PID 2836 wrote to memory of 2244 2836 faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\faef48db08888e05b08bde38509df4c1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Adds Run key to start application
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD5faef48db08888e05b08bde38509df4c1
SHA1b21d9a22c33b332a5a54a419d575a66562ef59b0
SHA2562d51bce661263c7bf8b93dbecee39b557daf57506c675cd7786621922ab4a8d6
SHA512f40e8f80b18f115473ed32ad69f7037bc9555286bf09667d57ec80291ec9965f3fb95f21d25ceb7ef1d15eb61dce5d9ec988d84e7b966049d6fee06e409db3cd