Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe
-
Size
113KB
-
MD5
26362b489bdc873853a3704c1e23a9cf
-
SHA1
46b4624524a4e72c5a4e712f848d6f7fc2ce3e18
-
SHA256
301e3c6c6703a7adf1f73f441c86cae8cb98a1256d38c3025a8f52c415dbdf04
-
SHA512
67620891948b21ec6415694d9f3c9997af672efe08fee6d21cac307b84b636978d35698090a36ff5f3ae3f5e500bfd57814825c260d3e5cc0c7227f7552249c2
-
SSDEEP
1536:IO5R8K9bQlrd6x2a2QMEwr3VubtSi1bL/GFGxbgEtppNBDwA6Bd+rfUwY9hE3JWy:IO5RP985+jwQf5tN1561w1QY8G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1744 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 2224 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1744 server.exe 1744 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 1728 wrote to memory of 2224 1728 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 28 PID 2224 wrote to memory of 1744 2224 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 29 PID 2224 wrote to memory of 1744 2224 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 29 PID 2224 wrote to memory of 1744 2224 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 29 PID 2224 wrote to memory of 1744 2224 26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe 29 PID 1744 wrote to memory of 1204 1744 server.exe 21 PID 1744 wrote to memory of 1204 1744 server.exe 21 PID 1744 wrote to memory of 1204 1744 server.exe 21 PID 1744 wrote to memory of 1204 1744 server.exe 21 PID 1744 wrote to memory of 1204 1744 server.exe 21 PID 1744 wrote to memory of 1204 1744 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\26362b489bdc873853a3704c1e23a9cf_JaffaCakes118.exe3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5c5cb3416d873569ae4dc3359230ff265
SHA16d869a8ea2393320d7dc1a9c24f6e39fea6a0099
SHA25621007126e9541c184fb61c3e6806ebd67f2d479ca66619851ae7b16fe31964e9
SHA512e587565dc3388cf16eb9d9ee91626705bd7057eb0673f59e0122585a0c16583d911401bf665dcc56934d7ed9fb3f06e4a19855ecbb54d161db9e4ccb8973f8ff