Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe
-
Size
700KB
-
MD5
25126c6b35332e0009b2589cfcacd10a
-
SHA1
fa39718357ef2f9ff91f89f0e53144e4d7d531cc
-
SHA256
a5119f61191f2c33a7c6d604c7fdecbf58a8d765ab3b966774e3cf0f1378cfdf
-
SHA512
e8e49e3a296bf329772bc70c8f03d5a473ab32fb97282263ba280bfdfbe4bfc9e64a2bf81e1bc932149cb2884e3cb76031cfa61b06b6d1c2227d1e573c7d2336
-
SSDEEP
12288:EJxEpYJi/QphJGnDx0dc3lOkTQQdjJfbVBHGeN:wxvyQph8nt0UL1bVdN
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 2288 agl25.exe 2192 agl25.exe 2944 agl25.exe 2572 agl25.exe 2568 agl25.exe 2660 agl25.exe 1504 agl25.exe 1884 agl25.exe 832 agl25.exe 1256 agl25.exe 1940 agl25.exe 1648 agl25.exe 1628 agl25.exe 2516 agl25.exe 1996 agl25.exe 2496 agl25.exe 1052 agl25.exe 1836 agl25.exe 2992 agl25.exe 2228 agl25.exe -
Loads dropped DLL 21 IoCs
pid Process 2620 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 2620 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 2288 agl25.exe 2192 agl25.exe 2192 agl25.exe 2572 agl25.exe 2572 agl25.exe 2660 agl25.exe 2660 agl25.exe 1884 agl25.exe 1884 agl25.exe 1256 agl25.exe 1256 agl25.exe 1648 agl25.exe 1648 agl25.exe 2516 agl25.exe 2516 agl25.exe 2496 agl25.exe 2496 agl25.exe 1836 agl25.exe 1836 agl25.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File created C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe File opened for modification C:\Windows\SysWOW64\agl25.exe agl25.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2360 set thread context of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2288 set thread context of 2192 2288 agl25.exe 30 PID 2944 set thread context of 2572 2944 agl25.exe 32 PID 2568 set thread context of 2660 2568 agl25.exe 34 PID 1504 set thread context of 1884 1504 agl25.exe 38 PID 832 set thread context of 1256 832 agl25.exe 40 PID 1940 set thread context of 1648 1940 agl25.exe 42 PID 1628 set thread context of 2516 1628 agl25.exe 44 PID 1996 set thread context of 2496 1996 agl25.exe 46 PID 1052 set thread context of 1836 1052 agl25.exe 48 PID 2992 set thread context of 2228 2992 agl25.exe 50 -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 2288 agl25.exe 2944 agl25.exe 2568 agl25.exe 1504 agl25.exe 832 agl25.exe 1940 agl25.exe 1628 agl25.exe 1996 agl25.exe 1052 agl25.exe 2992 agl25.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2620 2360 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 28 PID 2620 wrote to memory of 2288 2620 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 29 PID 2620 wrote to memory of 2288 2620 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 29 PID 2620 wrote to memory of 2288 2620 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 29 PID 2620 wrote to memory of 2288 2620 25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe 29 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2288 wrote to memory of 2192 2288 agl25.exe 30 PID 2192 wrote to memory of 2944 2192 agl25.exe 31 PID 2192 wrote to memory of 2944 2192 agl25.exe 31 PID 2192 wrote to memory of 2944 2192 agl25.exe 31 PID 2192 wrote to memory of 2944 2192 agl25.exe 31 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2944 wrote to memory of 2572 2944 agl25.exe 32 PID 2572 wrote to memory of 2568 2572 agl25.exe 33 PID 2572 wrote to memory of 2568 2572 agl25.exe 33 PID 2572 wrote to memory of 2568 2572 agl25.exe 33 PID 2572 wrote to memory of 2568 2572 agl25.exe 33 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2568 wrote to memory of 2660 2568 agl25.exe 34 PID 2660 wrote to memory of 1504 2660 agl25.exe 37 PID 2660 wrote to memory of 1504 2660 agl25.exe 37 PID 2660 wrote to memory of 1504 2660 agl25.exe 37 PID 2660 wrote to memory of 1504 2660 agl25.exe 37 PID 1504 wrote to memory of 1884 1504 agl25.exe 38 PID 1504 wrote to memory of 1884 1504 agl25.exe 38 PID 1504 wrote to memory of 1884 1504 agl25.exe 38 PID 1504 wrote to memory of 1884 1504 agl25.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 488 "C:\Users\Admin\AppData\Local\Temp\25126c6b35332e0009b2589cfcacd10a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 536 "C:\Windows\SysWOW64\agl25.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 536 "C:\Windows\SysWOW64\agl25.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 532 "C:\Windows\SysWOW64\agl25.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1884 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 540 "C:\Windows\SysWOW64\agl25.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1256 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 524 "C:\Windows\SysWOW64\agl25.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 524 "C:\Windows\SysWOW64\agl25.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 528 "C:\Windows\SysWOW64\agl25.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 524 "C:\Windows\SysWOW64\agl25.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1836 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\system32\agl25.exe 528 "C:\Windows\SysWOW64\agl25.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\agl25.exeC:\Windows\SysWOW64\agl25.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700KB
MD525126c6b35332e0009b2589cfcacd10a
SHA1fa39718357ef2f9ff91f89f0e53144e4d7d531cc
SHA256a5119f61191f2c33a7c6d604c7fdecbf58a8d765ab3b966774e3cf0f1378cfdf
SHA512e8e49e3a296bf329772bc70c8f03d5a473ab32fb97282263ba280bfdfbe4bfc9e64a2bf81e1bc932149cb2884e3cb76031cfa61b06b6d1c2227d1e573c7d2336