Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
DemostrativoExtrato.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
DemostrativoExtrato.exe
Resource
win10v2004-20240426-en
General
-
Target
5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar
-
Size
1.8MB
-
MD5
5e67e79705712dbb752ced2a38755195
-
SHA1
6d03e027b5075ff19996d8eedf4a32130ef87208
-
SHA256
4e9eb2010a695b87992aba196d895eee1a6c2d53f9c23bea13ed15a3860b0e0b
-
SHA512
f7a17d725b70679de458b49e9d87c5e628e70f7a1571972600e33a5c38b6fa1a49f197e5e0398a4fe2a9fb77765d447b9d57243a35ea906f0271d31840ecee82
-
SSDEEP
49152:803tmtf+pnDYVsWDcbdDuDYBbp6ja42Y+6fD7kg:9M1+9DYVdkMsB4P2S8g
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid Process 2200 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid Process 2200 vlc.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
Processes:
vlc.exepid Process 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe -
Suspicious use of SendNotifyMessage 15 IoCs
Processes:
vlc.exepid Process 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe 2200 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid Process 2200 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exerundll32.exerundll32.exedescription pid Process procid_target PID 2932 wrote to memory of 2636 2932 cmd.exe 29 PID 2932 wrote to memory of 2636 2932 cmd.exe 29 PID 2932 wrote to memory of 2636 2932 cmd.exe 29 PID 2636 wrote to memory of 2652 2636 rundll32.exe 30 PID 2636 wrote to memory of 2652 2636 rundll32.exe 30 PID 2636 wrote to memory of 2652 2636 rundll32.exe 30 PID 2652 wrote to memory of 2200 2652 rundll32.exe 32 PID 2652 wrote to memory of 2200 2652 rundll32.exe 32 PID 2652 wrote to memory of 2200 2652 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\5e67e79705712dbb752ced2a38755195_JaffaCakes118.rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
-