Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe
-
Size
260KB
-
MD5
ff21ecdc027f0f712ca4c84b399fdd35
-
SHA1
29c4730a3042ae18bcffd5f114a6a1b4eaa9e97c
-
SHA256
825007dd6e40717b2c85ec92ad791837417a4afa85f4a6be88f4af6dbec6df4f
-
SHA512
fb339b32f7bc327f288c912ea2aaa72d9fcebb899c7b111f09ca7a13ab0fe9378cb5c590141f69475ea0236fb18e83908016533760245abdf7dc9c16114d4c69
-
SSDEEP
6144:kfzzsA7p/mYVU53gLVi0BHWjGJO5ItK/z+gzR50t28py6d/KXn:Az4A7p/m6qwLs0BHYGJO5It6zVStNy6O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4300 Fouad.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Klass = "C:\\Windows\\Fouad.exe" Fouad.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Fouad.Exe Fouad.exe File opened for modification C:\Windows\name ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe File opened for modification C:\Windows\dir ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe File opened for modification C:\Windows\Fouad.exe ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe File opened for modification C:\Windows\name Fouad.exe File opened for modification C:\Windows\dir Fouad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4300 Fouad.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4944 ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe 4300 Fouad.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4300 4944 ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe 85 PID 4944 wrote to memory of 4300 4944 ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe 85 PID 4944 wrote to memory of 4300 4944 ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff21ecdc027f0f712ca4c84b399fdd35_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\Fouad.exeC:\Windows\Fouad.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5ff21ecdc027f0f712ca4c84b399fdd35
SHA129c4730a3042ae18bcffd5f114a6a1b4eaa9e97c
SHA256825007dd6e40717b2c85ec92ad791837417a4afa85f4a6be88f4af6dbec6df4f
SHA512fb339b32f7bc327f288c912ea2aaa72d9fcebb899c7b111f09ca7a13ab0fe9378cb5c590141f69475ea0236fb18e83908016533760245abdf7dc9c16114d4c69
-
Filesize
84B
MD5fc21212227b1ff366fee58a307b3c670
SHA1033855f29e7e02c67a72fd3070b9dc62cff3151f
SHA25695faf903f015319b221d267fdef679b4c4cc31dec9954ab48a0206e83cf97ba5
SHA512144b944ae3c31fb8415dc6af67a5f091e84265c53fa15d056adee4b02fc31669b4282da226de9e0a4f02080b440dae23aabbe586732e1c8e33e986b533d129eb
-
Filesize
5B
MD57b0144a4add0a8209e84c264af4ea632
SHA1c1a447c1e1dc9ccd4faa488e69984eed65835b0c
SHA256dca7613917f0dbe8dfce3d38815e8e81acaf56901ab28525ac26829f47c64a29
SHA5122f2ffe3ad431635fd7e4b409eb98c82d576ef465a34cee25546e0562ac6cdddb377bab3b7c746128728ca219b093ffa24fe55e25d2bf836d79e0fa9bca815b33