Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe
-
Size
132KB
-
MD5
0e607cc6c389e4e06066a2a2d5bcb0ee
-
SHA1
9634eb6900f7fbdb2af389edc26127ce1f91b37b
-
SHA256
6c375eb497a389313ca6a9d86600e24b03e9e3f4c1b2cbb94f90c927106dabd9
-
SHA512
ac2cc064429c4691d8f15c8e3bc5a17c66e8614d99885b15320039773a04b9d3d2177242159b317ba3c7ed319f4eb9f2711a05241df1ffc498c306dea5bcf72d
-
SSDEEP
768:Le3DeC08mMlc101WORuBtVK3J5hKTUbF6VyE6MBHYd/90XMQpPDch6J94znByfTa:C3DJmEzbuBHW08GO6J9onkS2l42qS8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\winlogon.exe 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe File opened for modification C:\Windows\winlogon.exe 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe File created C:\Windows\winlogon.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe 2728 winlogon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2172 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 2172 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 2728 winlogon.exe 2728 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2728 2172 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 28 PID 2172 wrote to memory of 2728 2172 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 28 PID 2172 wrote to memory of 2728 2172 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 28 PID 2172 wrote to memory of 2728 2172 0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e607cc6c389e4e06066a2a2d5bcb0ee_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\winlogon.exe"C:\Windows\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD50e607cc6c389e4e06066a2a2d5bcb0ee
SHA19634eb6900f7fbdb2af389edc26127ce1f91b37b
SHA2566c375eb497a389313ca6a9d86600e24b03e9e3f4c1b2cbb94f90c927106dabd9
SHA512ac2cc064429c4691d8f15c8e3bc5a17c66e8614d99885b15320039773a04b9d3d2177242159b317ba3c7ed319f4eb9f2711a05241df1ffc498c306dea5bcf72d