Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
2871d752f618367d72345e44e3854760_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2871d752f618367d72345e44e3854760_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2871d752f618367d72345e44e3854760_JaffaCakes118.exe
-
Size
166KB
-
MD5
2871d752f618367d72345e44e3854760
-
SHA1
cc87fcae6c24609686cf8b15193b56c5d9c91000
-
SHA256
245162fd63c2d72cb7a182fe903b56dff3197eb9de1c2245e636e7421f818dad
-
SHA512
18d0750d9a2116535a36bdbbd9d3cb249e6d61c9775440decbe72743cfc4cb40396197fbe3d3082662662779323d6aebf443b61009ed70e127254c25a7c2f049
-
SSDEEP
3072:gKDAfCDSmJ01QR8j8wdIlU+44hDThgND0aFSElSBTux53ZM4vazD1QaH3E23:gRg68wJ49hmg2/lSVkHM4vazWaHx3
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" scVhost.exe -
Executes dropped EXE 2 IoCs
pid Process 2584 scVhost.exe 2504 Pandhu_Dtr_AF.exe -
Loads dropped DLL 7 IoCs
pid Process 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 2504 Pandhu_Dtr_AF.exe 2504 Pandhu_Dtr_AF.exe 2504 Pandhu_Dtr_AF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2584 scVhost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2504 Pandhu_Dtr_AF.exe 2584 scVhost.exe 2504 Pandhu_Dtr_AF.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2584 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2584 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2584 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2584 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 30 PID 1368 wrote to memory of 2504 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2504 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2504 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2504 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2504 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2504 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 31 PID 1368 wrote to memory of 2504 1368 2871d752f618367d72345e44e3854760_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2871d752f618367d72345e44e3854760_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2871d752f618367d72345e44e3854760_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\scVhost.exe"C:\Users\Admin\AppData\Local\Temp\scVhost.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\Pandhu_Dtr_AF.exe"C:\Users\Admin\AppData\Local\Temp\Pandhu_Dtr_AF.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD56a94096020a609c3cd42210c6de4f2ef
SHA12a289b008babea45409990c6ded71f9d5bb9d25f
SHA256b8e652ae27526467f3cddbb63ac29252e50747ef0e5a3520eff121f5c0f6d6c0
SHA512ffee56432b692cbcf91ad8af7678e18541aada3e2c2bc7439b9d9c79c4570664afd2f108e7079ece1d442d3f542cd77f361b12017fda9d5faddb0b2fca2c157f
-
Filesize
64KB
MD533e414a858f3e10eb4a654cd2d97d608
SHA1891d799d527d589179130280a0ca620d346f1554
SHA256219e95995a758e8ade4bda2dc49c1fca5d01c2cd4af575e0023c8cce2b476aa8
SHA512d493a08d4c0e4969a7611b8312906bb67a215354369aee9e5cacabbf757f571fd00c07ccfa51b8a9672ce7b72672cfd11d5080f048b204a7c276b631bda32687