Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 02:47
Behavioral task
behavioral1
Sample
274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe
-
Size
469KB
-
MD5
274cd59079345bd3ae12dbe235ada6d8
-
SHA1
fb18580ab57690c7b2aeb6ab9d400dcbd39a6802
-
SHA256
7e93298fd5888b4c8fc1a8e98b85a6908d420dd3d9994e120a3838838c468d66
-
SHA512
bc9f28da6dd9593fde53546206d81e7e03ace731f2abb89e4e5ee06f8aa4465bb7c55d5af8a3460ddc7b3d839b4706136ccaf91c11930509117444ca303866be
-
SSDEEP
12288:HziXv4GeqH/K/QLU4CGMnySfjLyYC1W/SX6s4k:HzQv7NfK/QLU9GMnySfjLyYy6SKE
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/820-0-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/820-41-0x0000000000400000-0x00000000004B9000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 820 set thread context of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3028 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28 PID 820 wrote to memory of 3028 820 274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\274cd59079345bd3ae12dbe235ada6d8_JaffaCakes118.exe2⤵
- Enumerates VirtualBox registry keys
- Suspicious behavior: EnumeratesProcesses
PID:3028
-