Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe
-
Size
13KB
-
MD5
fde0a1649e48a23ae7b097917ba637f7
-
SHA1
7828249946674617f487882485094f0dbe437491
-
SHA256
214b7db18e0c935e3b6e5e0b5c47f2a4ecb19035af7fe5e95aa9d8bf87089d66
-
SHA512
a16d7f1b77f21ad4df83bd9783ef73c575a5a1139b3a558ff0fbdfed72ab10b956a71e8ef8c1c7b0a7cd2ab04634bff1653ea10760f8e3e6a58739473fa034d8
-
SSDEEP
384:IWbeMJvcDTyMDYdtuyxSS0UfRC+Ibo5lt+LQl1Fl:TnN0zsROE5L+Uhl
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\ktdnbwxn.dll = "{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}" fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ktdnbwxn.tmp fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ktdnbwxn.tmp fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ktdnbwxn.nls fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9} fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ = "C:\\Windows\\SysWow64\\ktdnbwxn.dll" fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ThreadingModel = "Apartment" fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2544 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2544 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2544 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe 28 PID 2352 wrote to memory of 2544 2352 fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fde0a1649e48a23ae7b097917ba637f7_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\83C0.tmp.bat2⤵
- Deletes itself
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD514fb6afc558d6ecc50e1808ab19d847a
SHA194c4ebf76970f0c578d8041796921e81217360bf
SHA2561647d5895c074173de649674e1159b2ac58d67f05fdc4e9ec141277ea4501414
SHA512ff8bec765b86050174835a9e57f63d637e7381328966f713e58803d826462db1935581c60418bd4647ccfc672b293a5462fd2adc5ca516dceb072b89f41ffabb
-
Filesize
428B
MD5d6e429914b807b21bcd27eff8129c8c2
SHA1c86b7235b8b918d31d5906c7747f98b0508b0f9c
SHA25674020bd53bfe0f2aec1cdbd5802fc32cd77052873c70c458224c06cbdbdb599f
SHA51270d21b6d9163c2eed08a3dcd8afa640e82c7678fe052c0875fc92ef523bc57b727fe70be0e1c9f65d86060eb6b7cb4325c077f74727896075ad3806050bc2973
-
Filesize
2.5MB
MD5219c698d96eb43bb210aaedbc6f4115d
SHA18daa36ac533e9176766c01c4979bc8341cda369b
SHA256508f1b578808d7bb1833ae06190aa8e75ca745ddc91905c560c122b7619b6af3
SHA512152a9cb10657e29582d45f5fc83bd686486e799012e216631f16121d002e4cfc12bb9785c4c73606049e7c135d9b76ef5cada297d4b0e1b25574fc7695fb8367