Analysis
-
max time kernel
141s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe
-
Size
80KB
-
MD5
292cf59fb18322a1c30d1e9df7d0243e
-
SHA1
28f0e2163377a35a135857e532ce653cf2378644
-
SHA256
853876b03bac9cf725a48c460ba9c8704f5def3e74ca53587878570b173bdafc
-
SHA512
a7336b648110dbe7b8b48f37765354672706f7900ac51c8f532ce0f0831164f7a38da0d3c4d7bae0fb4d178f93a5acc442be677bfdea7da882992ff7398bf7d7
-
SSDEEP
1536:bc8iXZ1O+jzttK5s/y4JmQ7DTsr2tCvdxLBEa2OtNVN0bYT:bczJtzy4JfjsSEvXdy8X0kT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1140 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HELP\F3C74E3FA248.dll 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe File opened for modification C:\Windows\HELP\F3C74E3FA248.dll 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765} 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\ = "SSUUDL" 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ = "C:\\Windows\\HELP\\F3C74E3FA248.dll" 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ThreadingModel = "Apartment" 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1140 292cf59fb18322a1c30d1e9df7d0243e_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5f2bf1bcb2c74691043478f4ff0b027d9
SHA19b093c6887b6f9445f69002236ef11dc64a57af9
SHA256722c1fb9ca2909858e9648fc11c9acd9dd8faa9da6c997ad15f3b2801b9bee92
SHA5126c2f99932cbaac29f93971f8658e10d9b552de04f353467458d660d4429ed8482ee48eddf859070208b1be59d134c68b022755dc6d8064c6e4317394bd695ee6