Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe
-
Size
7KB
-
MD5
fb1e248939ae117af317ae638d88b514
-
SHA1
e3dab5b262eec47bf623077b3d3d88403a14cfd1
-
SHA256
e56878422a2e1f70a90a3b775b3b629e2ac50be6696b1d0b6f1d0ef75f87d96b
-
SHA512
f9cae862b1697c512027f6e2bfb7bb00fd99e0d51a99cae23a39c9eda0acf9271b21c9d8e5426742bfb3501fd2f6027e26bd533bbc0316d606b781bdbb4f2067
-
SSDEEP
96:qiOHHdgCCvbl2dSW+3IBGMEm18S2PDEZhHOiScpb:aI6SJkHE8LKD7i
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ctfmom.exe File opened for modification C:\Windows\system32\drivers\etc\hosts fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4208 ctfmom.exe 4328 ctfmom.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfnon.exe = "ctfmom.exe" fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfnon.exe = "ctfmom.exe" ctfmom.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctfmom.exe fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ctfmom.exe fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe File created C:\Windows\SysWOW64\ctfmom.exe ctfmom.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2412 fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe 4208 ctfmom.exe 4328 ctfmom.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4208 2412 fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe 90 PID 2412 wrote to memory of 4208 2412 fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe 90 PID 2412 wrote to memory of 4208 2412 fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe 90 PID 4208 wrote to memory of 4328 4208 ctfmom.exe 91 PID 4208 wrote to memory of 4328 4208 ctfmom.exe 91 PID 4208 wrote to memory of 4328 4208 ctfmom.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb1e248939ae117af317ae638d88b514_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\ctfmom.exeC:\Windows\system32\ctfmom.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\ctfmom.exeC:\Windows\system32\ctfmom.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3896 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5fb1e248939ae117af317ae638d88b514
SHA1e3dab5b262eec47bf623077b3d3d88403a14cfd1
SHA256e56878422a2e1f70a90a3b775b3b629e2ac50be6696b1d0b6f1d0ef75f87d96b
SHA512f9cae862b1697c512027f6e2bfb7bb00fd99e0d51a99cae23a39c9eda0acf9271b21c9d8e5426742bfb3501fd2f6027e26bd533bbc0316d606b781bdbb4f2067
-
Filesize
54B
MD5ab5045f2db1619bd15a7929b85db114d
SHA15fe5084137b2e320c1a82360852e8e25bf7ee0aa
SHA256941d3015907326cd48388de2ad815267423033c001941722571fa16ebd129b82
SHA5127599f2f0dc5162599c3856b5ddf712bbbf106c86549e7b3da5e81bb8c644dc7aa786d6aa1e2489f83baf9f629e2e3ab05ef4d24a052dc96ed04f45bf15086122