Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe
-
Size
120KB
-
MD5
fe0853cbb59dd2671443bdb4d5e10899
-
SHA1
c8de25e4fe5a1ee238ea814644388e03402f9357
-
SHA256
cfc4f83ccd4f3b25487f89263c246b1d805d911bb3ec5b1d5a85d49475191682
-
SHA512
93d5d113a4780d29c9c2c5e5f8f32233eff73ff8b8f30a26362a704ab2f4559e34d286ba383db32b22c78af306a6aed63b2a4824d3dccd0da639d2bed1e3b2b1
-
SSDEEP
3072:3SHBPYkpyeZ4iA799O50NhSAOlRXJdg2t+0exaf6Rcg:3yBPYkoeZUZY54gxg2tFecS+
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4012 rundll32.exe 4328 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tcomitamewiga = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\cagcoxti.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4208 fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe 4012 rundll32.exe 4328 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4012 4208 fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe 87 PID 4208 wrote to memory of 4012 4208 fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe 87 PID 4208 wrote to memory of 4012 4208 fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe 87 PID 4012 wrote to memory of 4328 4012 rundll32.exe 100 PID 4012 wrote to memory of 4328 4012 rundll32.exe 100 PID 4012 wrote to memory of 4328 4012 rundll32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\cagcoxti.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\cagcoxti.dll",iep3⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5ee82a345f0d2f2b9e2f420c3c8a497c1
SHA17bbc3d32f3df2a2c5388481b8a3fc2d7f4c9631a
SHA25681bf96916e4e18732936a4ee616604b5a82373d67e9ffd6ebb307596ad680b30
SHA512e6749e5d0d036c7e99919be69ea8743ea12f0868e86f608e1ed7a092cae336627c3625156851edf5ee469d21ed0d7c4596fd8a9585fcdbaf8eca779631b72189