Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
8e6e55693ebbb6378e968f983042bcb5
-
SHA1
e1be4d13116159c5fcd2e0641d1f0aaa0070e650
-
SHA256
9c02cd14cfdc23246c31d278411172f11e7c9d61efd865ea2d0748498531833d
-
SHA512
9142b4e32b50ee1b0c7b95c91263abbc97d7228e8c06e502bd77596e1e2a66f7723f583c24f2ec72a6c6d0930bc861be3e94f3a90acb2e8298c2fdc5d3fcc2c3
-
SSDEEP
24576:GRmJkqoQrilOIQ+yMxUaGcpcCv73VGRrwEemIYLevnBS+/RIENZkr3:PJXoQryTiMxUaGc93G3
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\key_name = "C:\\Users\\Admin\\AppData\\Roaming\\MSBuild\\MSBuild.exe" 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exedescription pid process target process PID 1792 set thread context of 2892 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exepid process 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exepid process 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exeMSBuild.exedescription pid process target process PID 1792 wrote to memory of 2892 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe MSBuild.exe PID 1792 wrote to memory of 2892 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe MSBuild.exe PID 1792 wrote to memory of 2892 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe MSBuild.exe PID 1792 wrote to memory of 2892 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe MSBuild.exe PID 1792 wrote to memory of 2892 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe MSBuild.exe PID 1792 wrote to memory of 2892 1792 8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe MSBuild.exe PID 2892 wrote to memory of 2656 2892 MSBuild.exe dw20.exe PID 2892 wrote to memory of 2656 2892 MSBuild.exe dw20.exe PID 2892 wrote to memory of 2656 2892 MSBuild.exe dw20.exe PID 2892 wrote to memory of 2656 2892 MSBuild.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e6e55693ebbb6378e968f983042bcb5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7683⤵PID:2656
-
-