Analysis Overview
SHA256
d5913d321f9637913c53adb1153de44c0fd3726703135e14bcdfda9eadb008cb
Threat Level: Shows suspicious behavior
The file 0385219a4ec376639d0d7f1516daaaad_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
ASPack v2.12-2.42
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Enumerates physical storage devices
Program crash
Suspicious use of SetWindowsHookEx
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-23 22:57
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-23 22:57
Reported
2024-06-23 22:59
Platform
win7-20240220-en
Max time kernel
140s
Max time network
121s
Command Line
Signatures
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 127.0.0.1:16181 | tcp |
Files
memory/2916-0-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-4-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-1-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-7-0x00000000002B0000-0x00000000002B1000-memory.dmp
memory/2916-12-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-14-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-15-0x00000000002B0000-0x00000000002B1000-memory.dmp
memory/2916-17-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-18-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-19-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-20-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-21-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-22-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-23-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-24-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-25-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-26-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-27-0x0000000000400000-0x000000000091E000-memory.dmp
memory/2916-28-0x0000000000400000-0x000000000091E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-23 22:57
Reported
2024-06-23 22:59
Platform
win10v2004-20240508-en
Max time kernel
140s
Max time network
50s
Command Line
Signatures
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\0385219a4ec376639d0d7f1516daaaad_JaffaCakes118.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3064 -ip 3064
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 220
Network
| Country | Destination | Domain | Proto |
| N/A | 127.0.0.1:16181 | tcp |
Files
memory/3064-0-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-2-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-4-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-7-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
memory/3064-12-0x0000000003140000-0x0000000003141000-memory.dmp
memory/3064-13-0x0000000005210000-0x0000000005211000-memory.dmp
memory/3064-14-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-15-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-17-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
memory/3064-16-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-18-0x0000000003140000-0x0000000003141000-memory.dmp
memory/3064-19-0x0000000005210000-0x0000000005211000-memory.dmp
memory/3064-20-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-21-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-22-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-23-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-24-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-25-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-26-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-27-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-28-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-29-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-30-0x0000000000400000-0x000000000091E000-memory.dmp
memory/3064-31-0x0000000000400000-0x000000000091E000-memory.dmp