Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe
-
Size
14KB
-
MD5
2387ddf6c1e8f9e34720e594aeca703c
-
SHA1
4fbba65730e48e204445762cd507aee1b130342c
-
SHA256
c6527ac90bb3bef526f3c0fd59850bc7bd0c689a4d128a1cdcfd7da010adc16f
-
SHA512
1077923125987ad44c30f565cc3da270d36dae0e76ab0083592a5dc82796f70ca343b881d183d6a683b4e883911adb8c190577053803dcde9d1aa0f25f2bab9c
-
SSDEEP
192:qzUNcknUK9NrAW58dG3Di+gmWVGnTnohnznQu6brA+eayAVR2bxATE0fsA:tckUKzifdVGTnmnsne6EmTEHA
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vjioftkb.dll = "{71A78CD4-E470-4a18-8457-E0E0283DD507}" 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\vjioftkb.tmp 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vjioftkb.tmp 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vjioftkb.nls 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ThreadingModel = "Apartment" 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507} 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71A78CD4-E470-4a18-8457-E0E0283DD507}\InProcServer32\ = "C:\\Windows\\SysWow64\\vjioftkb.dll" 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 4836 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 83 PID 2368 wrote to memory of 4836 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 83 PID 2368 wrote to memory of 4836 2368 2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2387ddf6c1e8f9e34720e594aeca703c_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\CB7E.tmp.bat2⤵PID:4836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5111a9256b743d5c8d573fe0480fd6b63
SHA1b7601bdee0f72c90c1d530b6192b211bc6c719ef
SHA256de25244b9647d0992c4b68881f4555c1d23394226d21f4731d3dc0bfa92fd861
SHA51236c067f2f073b54586e4f3fdda90e85e5a2c7d3ad90718ac8197236a30930c594d9be348fb4e56568a04c9811cb19096a9f1f57c60e1b3e9fd8aaedd432afc8e
-
Filesize
428B
MD5a7a877b803cee40c3f2a49e201d99499
SHA1d6ae66238ba488af6b5211ffa596f85f727eee82
SHA2566b8cbcff99a72eac167c4ca77eac84d845a573219e31991903e5a056f36e6151
SHA5120e3825e1b3fb236c92cd25207061bb6cae635674f7c57510b48c51fe44a52725f3001ae72d1f1756ea829bfe14a8d7e04790e1cedca747a10935be84ffb10f3a
-
Filesize
2.0MB
MD5ca9c1a2ced582a9cc46ae1c1a85b2417
SHA163b1c0f5741cc162f867b4c7ad9e8a78c4c0c3bc
SHA256f221462f3f2febaf8983c351d3e91a9cf585e368cddeeb93ef37e663dc71b742
SHA512897821d8dd34b9ab574e496920d47c49379865dd2a4c0d6b941c35ec073096102050b19dbeb63e5e30e0a2863784a67bcf256386a2a4a0b2e46b84357ccb0e4a