Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe
-
Size
72KB
-
MD5
38ccf9d470fabc7f8b5cb5d809b2be79
-
SHA1
4252ed198509b867a0b92bb377042d52c5dccab3
-
SHA256
5ef7a147f719d2cc894d6748b832d02c0d70ebe9fa33d3ad049e0113ef4f0c11
-
SHA512
f23f3e5db374d836600394ef660ac6739c476f8fcc7492912c895056ac104d9aafad09116e2f71825b5b54be8b115bded8e2de5b44492f4253b45daa3d1fb3ba
-
SSDEEP
768:mqrPvh/VXqdvbBy8+2tFt7MCWlGivdZxe1JUQ2nzc4+eyWCmGEC633QnvedpGlru:UDzNFudGivjszTmzhCmGu33QnvqIRnh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1620 dnflogin.exe -
Loads dropped DLL 1 IoCs
pid Process 1620 dnflogin.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\mygod.ime dnflogin.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\dnf\dnflogin.exe 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe File opened for modification C:\Program Files\dnf\dnflogin.exe 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 1620 dnflogin.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 972 wrote to memory of 1940 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 84 PID 972 wrote to memory of 1940 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 84 PID 972 wrote to memory of 1940 972 38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe 84 PID 1940 wrote to memory of 1620 1940 cmd.exe 86 PID 1940 wrote to memory of 1620 1940 cmd.exe 86 PID 1940 wrote to memory of 1620 1940 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38ccf9d470fabc7f8b5cb5d809b2be79_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c tr.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files\dnf\dnflogin.exe"C:\Program Files\dnf\dnflogin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1620 -ip 16201⤵PID:2000
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD538ccf9d470fabc7f8b5cb5d809b2be79
SHA14252ed198509b867a0b92bb377042d52c5dccab3
SHA2565ef7a147f719d2cc894d6748b832d02c0d70ebe9fa33d3ad049e0113ef4f0c11
SHA512f23f3e5db374d836600394ef660ac6739c476f8fcc7492912c895056ac104d9aafad09116e2f71825b5b54be8b115bded8e2de5b44492f4253b45daa3d1fb3ba
-
Filesize
192B
MD56d3939a822668b3b93e8b4db0b8e3ece
SHA18b33418fbe5ddf9d2850d08a099bafc36e1356ea
SHA256927b7a437bb5ff7e0a18a3491ceccc1ec3a22b6e89b66d439964ac1e7d0f2cc1
SHA512e8cc606927a7f5e473e4cf3ae39a9d434a64393cfcf81d7ffbe365142738e1d6499ca78e87f8f2859a8b5637e1d988b56fe7b305b90881180ae3f55f338ca24a
-
Filesize
25KB
MD5f32a9489bddd2b4169508a179cdf01ce
SHA146173c693700221801abcf55f71f84ff37125788
SHA256be1cbf616245f9cc692a15af2be235ef6557322271eda8b0952e1fb18cc92296
SHA5125a810963f2577f7316e9200f7ded12cd8d4bb4661030a7d3ba982edec921db2fee624eeccf10bcd29535f73806af32940cf717ec102c42210e799336e19e7c61