Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe
-
Size
152KB
-
MD5
042d64c412ec167fbdefabc6432d0859
-
SHA1
36c3ecfc7bda59bf71f7a3163addb65b10ca86d8
-
SHA256
3b3c717f0b6121d8862f4bb0408bd2a225b42829c790d9054b642597bc690f9c
-
SHA512
bd4593927b2e97df66b70c7b64866d34b3c868959b057cc0e90a99a07ce2442d7b52d817ce060d6a1274af0b3901f91eb3add00c2c710cd5a72c152e462b3954
-
SSDEEP
1536:e6myQm5x9jSp42U/35fK6q+vMoGMaK9aWLwbOB0QQiz:zn3Wy2w5fK6tvFt9aW+Ozfz
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\51C830A5 = "C:\\Users\\Admin\\AppData\\Roaming\\51C830A5\\bin.exe" winver.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exedescription pid process target process PID 2032 set thread context of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe 2212 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
winver.exeExplorer.EXEpid process 2212 winver.exe 1392 Explorer.EXE 1392 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1392 Explorer.EXE 1392 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exepid process 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exewinver.exedescription pid process target process PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2032 wrote to memory of 2052 2032 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe PID 2052 wrote to memory of 2212 2052 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe winver.exe PID 2052 wrote to memory of 2212 2052 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe winver.exe PID 2052 wrote to memory of 2212 2052 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe winver.exe PID 2052 wrote to memory of 2212 2052 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe winver.exe PID 2052 wrote to memory of 2212 2052 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe winver.exe PID 2212 wrote to memory of 1392 2212 winver.exe Explorer.EXE PID 2212 wrote to memory of 1228 2212 winver.exe taskhost.exe PID 2212 wrote to memory of 1324 2212 winver.exe Dwm.exe PID 2212 wrote to memory of 1392 2212 winver.exe Explorer.EXE PID 2212 wrote to memory of 1964 2212 winver.exe DllHost.exe PID 2212 wrote to memory of 2052 2212 winver.exe 042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1228
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1324
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\042d64c412ec167fbdefabc6432d0859_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\winver.exewinver4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2212
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1964