Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 08:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe
Resource
win7-20240220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe
-
Size
65KB
-
MD5
21c77009a1fdbcf1f7ad302b6e086abf
-
SHA1
86c969c15e10337aa8068ca19d6a120b956d0581
-
SHA256
83e6e59866a2cee9468f82b39f352c3fe4f437704f769e3e8a7d6525ca3fccfd
-
SHA512
8f6433868bb78d691edd82448a4c0789346fc9b52c2ab68bc5b071be911eaed7b1e8fac560489aaff64b22f32134b14c4908a06fbbd814069c5d626c697181a1
-
SSDEEP
1536:KydmkrC+gACNJs1xr5vIvIm19xjEFDsJAa24K2WWWd7JBnQ4/QCMTP6cYC:prxyKLdQAm195pOjHdNBnJC6cYC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3996-1-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3996-5-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3996-4-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3996-3-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3996-8-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lsass Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\lsass.exe" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1180 set thread context of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 4992 3996 WerFault.exe 80 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\LCMPD = "net" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Internet Explorer\Main 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Inst = "no" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Inst = "yes" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Cmc = "yes" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\F0x = "C:\\Users\\Admin\\AppData\\Local\\Temp\\21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\UID = "f3688b13" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Ver = "14" 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3996 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 3996 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80 PID 1180 wrote to memory of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80 PID 1180 wrote to memory of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80 PID 1180 wrote to memory of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80 PID 1180 wrote to memory of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80 PID 1180 wrote to memory of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80 PID 1180 wrote to memory of 3996 1180 21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\21c77009a1fdbcf1f7ad302b6e086abf_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 5163⤵
- Program crash
PID:4992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3996 -ip 39961⤵PID:736