Analysis
-
max time kernel
149s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe
-
Size
56KB
-
MD5
2725a576a0776c900e67b6e88ffe5f15
-
SHA1
555b19207ee93a6fd3d23899ebee5da557b3c449
-
SHA256
db34177e41e2507aaf4af20d7c770f992e9747d14ecd2ef441b94a051a3be804
-
SHA512
c66d5d7c7c0e9b8879bc317060ef29f5c4d43ccd7094188e66743f610256718c0d2e5eee76e2e6cbc6e2ce7d5c4e5cbda0dd2a616b702580c94f91d5bccdaa5b
-
SSDEEP
768:v6C45EC6O5EnWHhLS0ikw/F6TckEt6bzGOj/gW:xfoCMudkwYmt6/rg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2268 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 csrcs.exe -
Loads dropped DLL 2 IoCs
pid Process 2268 svchost.exe 2268 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrcs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrcs.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 560 set thread context of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 2864 set thread context of 2960 2864 csrcs.exe 31 -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 560 wrote to memory of 2268 560 2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe 29 PID 2268 wrote to memory of 2864 2268 svchost.exe 30 PID 2268 wrote to memory of 2864 2268 svchost.exe 30 PID 2268 wrote to memory of 2864 2268 svchost.exe 30 PID 2268 wrote to memory of 2864 2268 svchost.exe 30 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31 PID 2864 wrote to memory of 2960 2864 csrcs.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2725a576a0776c900e67b6e88ffe5f15_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\csrcs.exe"C:\Users\Admin\AppData\Local\Temp\csrcs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD52725a576a0776c900e67b6e88ffe5f15
SHA1555b19207ee93a6fd3d23899ebee5da557b3c449
SHA256db34177e41e2507aaf4af20d7c770f992e9747d14ecd2ef441b94a051a3be804
SHA512c66d5d7c7c0e9b8879bc317060ef29f5c4d43ccd7094188e66743f610256718c0d2e5eee76e2e6cbc6e2ce7d5c4e5cbda0dd2a616b702580c94f91d5bccdaa5b