Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 21:12
Behavioral task
behavioral1
Sample
0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe
-
Size
252KB
-
MD5
0083d7db33439e4f5dd108519d4b3d79
-
SHA1
914e61639ce83a4b6340bcd02555a2e180f0913a
-
SHA256
e179b90488ae191a49ee529219153ee8eb8e510a95de95e16a6c3d491d212d64
-
SHA512
4fd56a3089c7e49e359d6c6d5c138de542e52bc7807b86cf5ee399b9949b976391ddb5b928175641cc2e0695c6f8a7d295c0730ef5387b25488b08fc322a2172
-
SSDEEP
3072:ZmNam7su4ob36VdPPMKcsBXt2IdriU5V5Sa+XaZU9EOGDphjRcNQlEqOcPk9Ji:MNuo0csBXt2IdriU5V5OABDrbuqdPk9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2344 cetrdeosa.exe 2832 cetrdeosa.exe -
Loads dropped DLL 3 IoCs
pid Process 2044 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 2044 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 2344 cetrdeosa.exe -
resource yara_rule behavioral1/memory/2204-1-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2204-16-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/files/0x000c000000012263-20.dat upx behavioral1/memory/2044-22-0x0000000000220000-0x0000000000261000-memory.dmp upx behavioral1/memory/2344-47-0x0000000000400000-0x0000000000441000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v7.5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cetrdeosa.exe" 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v7.5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cetrdeosa.exe" 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2204 set thread context of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2344 set thread context of 2832 2344 cetrdeosa.exe 30 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 2344 cetrdeosa.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2044 2204 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 28 PID 2044 wrote to memory of 2344 2044 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2344 2044 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2344 2044 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 29 PID 2044 wrote to memory of 2344 2044 0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe 29 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30 PID 2344 wrote to memory of 2832 2344 cetrdeosa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0083d7db33439e4f5dd108519d4b3d79_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\cetrdeosa.exe"C:\Users\Admin\AppData\Local\Temp\cetrdeosa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\cetrdeosa.exeC:\Users\Admin\AppData\Local\Temp\cetrdeosa.exe4⤵
- Executes dropped EXE
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD50083d7db33439e4f5dd108519d4b3d79
SHA1914e61639ce83a4b6340bcd02555a2e180f0913a
SHA256e179b90488ae191a49ee529219153ee8eb8e510a95de95e16a6c3d491d212d64
SHA5124fd56a3089c7e49e359d6c6d5c138de542e52bc7807b86cf5ee399b9949b976391ddb5b928175641cc2e0695c6f8a7d295c0730ef5387b25488b08fc322a2172