Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 17:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe
-
Size
660KB
-
MD5
642b61945c42587f18d68cf52ba21e9e
-
SHA1
977c4d5af237ad6b8a4ff083356a60540e7a860c
-
SHA256
a0d96b8cb45e309dc4b6b2f8835e280ba0c3827de6407bd0de77bc4379e365aa
-
SHA512
e99308054d31ab17a66a903f9113a08c103403fd14b6f98ee617b0fb48f61f2174b9a12a7ae17db5e8fc69e74813785448dcc2817c1e5bbf8d0947b6a6022eb7
-
SSDEEP
6144:rw3Wp0yN90QE7soPUPSISrndZ68t9bUEghyVlnEzADTDZvyLrXn8XKaZ:rw3y90+oPUKI0kCbUEgklnEUXhzXKc
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2932 PP_OUT~2.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2932 PP_OUT~2.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 2932 4704 642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe 83 PID 4704 wrote to memory of 2932 4704 642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe 83 PID 4704 wrote to memory of 2932 4704 642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\642b61945c42587f18d68cf52ba21e9e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP_OUT~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PP_OUT~2.EXE2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932
-