Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 08:11
Behavioral task
behavioral1
Sample
00588367f6784ac06ff0740703402cba_JaffaCakes118.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
General
-
Target
00588367f6784ac06ff0740703402cba_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
00588367f6784ac06ff0740703402cba
-
SHA1
66d26d9da3d5575242a98e4c39c43202d255668a
-
SHA256
10de539cf989a9a7a323f1c66ea9b7f2120d6e05df84a2e10c95d7271afa1ccf
-
SHA512
905a903aa508cf8f77c3beee5b673431f616728b7de198a7fe9377aab0e6070551c7f844550c4159beee1fbbc28aafdf5028ec6287a7bee477acf9c88db70212
-
SSDEEP
49152:TNoUUabRJ4yQQEJ/341ym7ddooFEBVq6y7/cIbu54y9hpPo4czaXQHjEuY7p3pE:Jf1hHEJ/tGMjq6yDXu54yXEbHj/Y7LE
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2884-0-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-13-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-14-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-15-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-18-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-19-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-20-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-22-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-23-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-24-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-25-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-26-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-27-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-28-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-29-0x0000000000400000-0x00000000009BC000-memory.dmp upx behavioral1/memory/2884-30-0x0000000000400000-0x00000000009BC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ = "DynamicNS" 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\00588367f6784ac06ff0740703402cba_JaffaCakes118.exe" 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID\ = "00588367f6784ac06ff0740703402cba_JaffaCakes118.DynamicNS" 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80} 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\LocalServer32 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\00588367f6784ac06ff0740703402cba_JaffaCakes118.DynamicNS 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\00588367f6784ac06ff0740703402cba_JaffaCakes118.DynamicNS\ = "DynamicNS" 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\00588367f6784ac06ff0740703402cba_JaffaCakes118.DynamicNS\Clsid 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\00588367f6784ac06ff0740703402cba_JaffaCakes118.DynamicNS\Clsid\ = "{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}" 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C379EAD1-CB34-4B09-AF6B-7E587F8BCD80}\ProgID 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2884 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2884 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe 2884 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe 2884 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe 2884 00588367f6784ac06ff0740703402cba_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00588367f6784ac06ff0740703402cba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00588367f6784ac06ff0740703402cba_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2884