Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe
-
Size
264KB
-
MD5
293906befa51c3ab72a9a94001a69dcb
-
SHA1
041d0389afa92c96605ef5342d0160b910e1e512
-
SHA256
01edb51ae3d6d79dd1b57a3a2cf84ad082f2a12cad2877c60e7dbe96ff251b22
-
SHA512
f051a38ecb2f68083540c75dd94a70fca9b892dde766b1bd36b4ac7cba004f9c9a5ffaea6bd99c5a665dba51822ea933eb009fd48b00bbf6ab96178f25a54eeb
-
SSDEEP
6144:uT1xXshLQAc+/GGRjdZAa5pddUkB/xr7i+TR/9JsBQOE05:uTLXeL9GcH9bBpq0pq7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2652 Fed.exe 968 Fed.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 968 2652 Fed.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 968 Fed.exe 968 Fed.exe 968 Fed.exe 968 Fed.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 Fed.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2652 2508 293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe 82 PID 2508 wrote to memory of 2652 2508 293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe 82 PID 2508 wrote to memory of 2652 2508 293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe 82 PID 2652 wrote to memory of 968 2652 Fed.exe 85 PID 2652 wrote to memory of 968 2652 Fed.exe 85 PID 2652 wrote to memory of 968 2652 Fed.exe 85 PID 2652 wrote to memory of 968 2652 Fed.exe 85 PID 2652 wrote to memory of 968 2652 Fed.exe 85 PID 2652 wrote to memory of 968 2652 Fed.exe 85 PID 2652 wrote to memory of 968 2652 Fed.exe 85 PID 968 wrote to memory of 3404 968 Fed.exe 56 PID 968 wrote to memory of 3404 968 Fed.exe 56 PID 968 wrote to memory of 3404 968 Fed.exe 56 PID 968 wrote to memory of 3404 968 Fed.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\293906befa51c3ab72a9a94001a69dcb_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fed.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fed.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fed.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Fed.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD59bbea4ee23e26d3b6fe53be2ed6b37db
SHA18c164fb2ca9b8da5b858a07880daa0f1acd45d86
SHA2564587b6616c2279fd8d4fec39872d04fe1bf5de14bcf4a38197135d9831b72b22
SHA512b65e8bf81326c755ab48c016c7ac24a67044ebe9081db954cacc710ec97cc7889890659e3ccb033a2dea9d9a0a7e3e301d3e4cfd1ad8184d178c983d3bc56b95