Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe
-
Size
196KB
-
MD5
0ed98a3cebdfad526ab344275929e8e6
-
SHA1
28de999c21d6cf893e43d4d2fc07b6c9db788754
-
SHA256
0c093958610a3bbe30adc07401c185c44df396d35610b8f92e640e267acee176
-
SHA512
78a30f30dd0b62fc62aa7332380aeaa66c0a9364cd7cdc264b999b010ed18235023aaf8b9f46d27f3635307c00849dea71b56a82cff4c612d3b13165f8b62650
-
SSDEEP
1536:UmSplFCH4dUzlxNmoYB0qxFKebO3XNH1R2TgRiR04RzPYrftlnJKNUj:UmUXDdaNmoYuWNwHQ8y04Wr/JKNA
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\svhost.exe\"" 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svhost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\svhost.exe\"" 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2024 set thread context of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2944 set thread context of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2716 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 2716 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2716 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2944 2024 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2716 2944 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 29 PID 2716 wrote to memory of 1348 2716 0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ed98a3cebdfad526ab344275929e8e6_JaffaCakes118.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e7b1e53cd661f76799a10cb63978c30a
SHA111c2dd43e19e97696c8e5128417fd67985149644
SHA25656b67faa87b0fa3f7d4f0d92b422827f9afab5ebafe9ee2c4dff4970be6a6700
SHA512054a10012dbf5e612af99d6a16817a725ed4340978af0d83937ed1ef5d7bf721167abf34342b4bd6f5417376953952aa406abc6670af6656312948e561d70246