Analysis
-
max time kernel
87s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 07:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe
-
Size
214KB
-
MD5
19498c2ac131974051d7adac28ceeeaa
-
SHA1
3995e94a52a2a9919cef11cb1da633ea231b2b47
-
SHA256
d5e4f9c0196feaa30993f496762e74608b709010f596657b74dad2c1370d2fe6
-
SHA512
6685b532406ddd600d63a2a30f2d6fc10f0b751301575cc90f9dc8f080741a7d84e23fdea2adb9c26925849055041f1c1501590dbefbb82a888a92a38be8dfd3
-
SSDEEP
3072:CgigP++ktLLS8ZsPWPD42Dc6gorR/+duY4M93pTN1xEKSu1/hg9Stx2bCNqvpk:8Yuk2CEY94M5fuKSygs2bCNq+
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3112 set thread context of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425721664" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{315611C2-3520-11EF-BA70-E659512317F8} = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe Token: SeDebugPrivilege 3412 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4832 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4832 IEXPLORE.EXE 4832 IEXPLORE.EXE 3412 IEXPLORE.EXE 3412 IEXPLORE.EXE 3412 IEXPLORE.EXE 3412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 3112 wrote to memory of 2796 3112 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 83 PID 2796 wrote to memory of 3212 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 84 PID 2796 wrote to memory of 3212 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 84 PID 2796 wrote to memory of 3212 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 84 PID 3212 wrote to memory of 4832 3212 iexplore.exe 85 PID 3212 wrote to memory of 4832 3212 iexplore.exe 85 PID 4832 wrote to memory of 3412 4832 IEXPLORE.EXE 86 PID 4832 wrote to memory of 3412 4832 IEXPLORE.EXE 86 PID 4832 wrote to memory of 3412 4832 IEXPLORE.EXE 86 PID 2796 wrote to memory of 3412 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 86 PID 2796 wrote to memory of 3412 2796 19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19498c2ac131974051d7adac28ceeeaa_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4832 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3412
-
-
-
-