Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe
-
Size
369KB
-
MD5
65d27697e295e256cdd137bb1eea6554
-
SHA1
d5b4c6534d317953199027083ad1fac8838b7501
-
SHA256
c698526d47dd4937aa1ae15f13428587ea5a5053040abeaf0a5dda5f39567542
-
SHA512
96f393bbe6fc8901a12d8cd21fe4d47d42e40a83588ff19294a2e84b85ce1acf81aaf040477a90fccc4b587a8d8225466281154dd902f7e59676deb8feac201d
-
SSDEEP
6144:R7Cd4ktZcqUcV/CfeAyi9QDypSmvgLainMCa2crbwwmrlVrlJM1:R7CdVtZcqUM/CfeAyiKGOa2ycwOHrzC
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SmileboxTray = "\"C:\\Users\\Admin\\AppData\\Roaming\\Smilebox\\SmileboxTray.exe\"" 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe -
Modifies registry class 15 IoCs
Processes:
65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Smilebox.archive\shell\open 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\smilebox\shell 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\.smilebox 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\MIME\Database\Content Type 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\MIME\Database\Content Type\application/smilebox 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Smilebox.archive\shell 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Smilebox.archive\shell\open\command 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\smilebox 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\smilebox\DefaultIcon 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\MIME 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Smilebox.archive 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Smilebox.archive\DefaultIcon 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\smilebox\shell\open 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\smilebox\shell\open\command 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\MIME\Database 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exepid process 4428 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exepid process 4428 65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65d27697e295e256cdd137bb1eea6554_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314B
MD56b1b5faf2fa2e8cc8e8521ba2aa15356
SHA1d4313936736b77ed76ab1cb7e3d377bfdca3304e
SHA256df29cd5ffd836714276496604469f5342bff30d493768743b9286790006db606
SHA512d73027ece42c76e9db68e95149f8a3af92aea67e4be3c6ae25289abca9609dd35270131e192b24eac5bb60245d6dbae6da9e759b40cc968e08cb98cc69e64a18