Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe
-
Size
49KB
-
MD5
164da67e2e120ddaa60def20c03c1455
-
SHA1
a4348201141e3635ba0667d3de179794f087b526
-
SHA256
9b87a8a3a18dd12d483f223b697ae0096bf523808411f0d52efabc0ab579094c
-
SHA512
3602b3591529702f5304bab2cef08a9c6e73c943b1681356ebb302bcacb3fae075a2b3196e87f5d3a26216a3042500290074a40179f3d3fee152f0b65e1178b9
-
SSDEEP
768:FCCCFlkbwAYbFshpyiB9L9Mx2BWseUCHGAwk5R9Jw:dbw/6plBTFBYNNR9Jw
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\0D02A53F = "C:\\Users\\Admin\\AppData\\Roaming\\0D02A53F\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe 2328 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 2328 winver.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exewinver.exedescription pid process target process PID 2392 wrote to memory of 2328 2392 164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe winver.exe PID 2392 wrote to memory of 2328 2392 164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe winver.exe PID 2392 wrote to memory of 2328 2392 164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe winver.exe PID 2392 wrote to memory of 2328 2392 164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe winver.exe PID 2392 wrote to memory of 2328 2392 164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe winver.exe PID 2328 wrote to memory of 1380 2328 winver.exe Explorer.EXE PID 2328 wrote to memory of 1240 2328 winver.exe taskhost.exe PID 2328 wrote to memory of 1324 2328 winver.exe Dwm.exe PID 2328 wrote to memory of 1380 2328 winver.exe Explorer.EXE
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\164da67e2e120ddaa60def20c03c1455_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1240-22-0x0000000077BB1000-0x0000000077BB2000-memory.dmpFilesize
4KB
-
memory/1240-21-0x0000000000290000-0x0000000000296000-memory.dmpFilesize
24KB
-
memory/1324-18-0x0000000001AC0000-0x0000000001AC6000-memory.dmpFilesize
24KB
-
memory/1324-23-0x0000000001AC0000-0x0000000001AC6000-memory.dmpFilesize
24KB
-
memory/1380-3-0x00000000027D0000-0x00000000027D6000-memory.dmpFilesize
24KB
-
memory/1380-2-0x00000000027D0000-0x00000000027D6000-memory.dmpFilesize
24KB
-
memory/1380-1-0x00000000027D0000-0x00000000027D6000-memory.dmpFilesize
24KB
-
memory/1380-9-0x0000000077BB1000-0x0000000077BB2000-memory.dmpFilesize
4KB
-
memory/1380-24-0x0000000002780000-0x0000000002786000-memory.dmpFilesize
24KB
-
memory/1380-20-0x0000000002780000-0x0000000002786000-memory.dmpFilesize
24KB
-
memory/2328-10-0x0000000077B60000-0x0000000077D09000-memory.dmpFilesize
1.7MB
-
memory/2328-5-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB
-
memory/2328-6-0x0000000077D60000-0x0000000077D61000-memory.dmpFilesize
4KB
-
memory/2328-7-0x0000000077D5F000-0x0000000077D60000-memory.dmpFilesize
4KB
-
memory/2328-8-0x0000000077D5F000-0x0000000077D61000-memory.dmpFilesize
8KB
-
memory/2328-28-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/2328-29-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB
-
memory/2392-11-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2392-12-0x00000000020B0000-0x0000000002AB0000-memory.dmpFilesize
10.0MB
-
memory/2392-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/2392-4-0x00000000020B0000-0x0000000002AB0000-memory.dmpFilesize
10.0MB