Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 18:52
Static task
static1
Behavioral task
behavioral1
Sample
000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe
-
Size
63KB
-
MD5
000a31a1845bc21c080793e385c71f3e
-
SHA1
74297ca6f9a1944f96e04aa9a4f83e7befa2e2e2
-
SHA256
5530f88666bfe7612b55cad4296c1fda8fff802d215ba4b3e28493083c6448bc
-
SHA512
bbbd6c0dbd8c0a29cf30c38f87ae2fcc885522ff6f727c85b1954b9578ec81743eec56ac1e3ba5250e675c687993787676b9eda886ca2b5d2bfac4ba84396642
-
SSDEEP
1536:1X0p5M1OKp54+lRkd9l8LXmPhhc+UZKtv4oN/ASfMkwdXs2:F04zoLlUUcDItvR6SfMkwdc2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2512 servicio.exe 2656 servicio.exe -
Loads dropped DLL 3 IoCs
pid Process 2832 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 2832 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 2512 servicio.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\servicio.exe" 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Service = "servicio.exe" 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\servicio.exe" servicio.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1464 set thread context of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 2512 set thread context of 2656 2512 servicio.exe 30 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 2512 servicio.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 1464 wrote to memory of 2832 1464 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 28 PID 2832 wrote to memory of 2512 2832 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 29 PID 2832 wrote to memory of 2512 2832 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 29 PID 2832 wrote to memory of 2512 2832 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 29 PID 2832 wrote to memory of 2512 2832 000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe 29 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30 PID 2512 wrote to memory of 2656 2512 servicio.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\000a31a1845bc21c080793e385c71f3e_JaffaCakes118.exe
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\servicio.exe"C:\Users\Admin\AppData\Local\Temp\servicio.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\servicio.exe
- Executes dropped EXE
- Adds Run key to start application
PID:2656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5000a31a1845bc21c080793e385c71f3e
SHA174297ca6f9a1944f96e04aa9a4f83e7befa2e2e2
SHA2565530f88666bfe7612b55cad4296c1fda8fff802d215ba4b3e28493083c6448bc
SHA512bbbd6c0dbd8c0a29cf30c38f87ae2fcc885522ff6f727c85b1954b9578ec81743eec56ac1e3ba5250e675c687993787676b9eda886ca2b5d2bfac4ba84396642