Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe
-
Size
223KB
-
MD5
29e1a43cddf7322b07de4567d4321dea
-
SHA1
be68e5db8229f2d758ccce5ff4ab9907a58a98af
-
SHA256
66874d10f13e565ab1f8c43584fd88093fe013ea1041d9b8003832af450452c6
-
SHA512
19fc1c81f5ea793b98e48decfdc52f184d7adf1979dcdf4ddf4e0b3c23e6b4bdc683b9ea6889e38f8a35b1640502e0309f8a8d5e1dfc1a690bf6855ed20fcccd
-
SSDEEP
6144:8XSkRcJlmnko9pUPfV05tYbP36Vo08s9N8qi7rrZx7UOynbX:JCczmnkZPfV0PSPvEg9x7sbX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2632 nodkrn23.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Svchost local services = "nodkrn23.exe" nodkrn23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\Microsoft Svchost local services = "nodkrn23.exe" nodkrn23.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\nodkrn23.exe 29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe File opened for modification C:\Windows\nodkrn23.exe 29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2632 2204 29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2632 2204 29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2632 2204 29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe 28 PID 2204 wrote to memory of 2632 2204 29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\nodkrn23.exeC:\Windows\nodkrn23.exe 560 "C:\Users\Admin\AppData\Local\Temp\29e1a43cddf7322b07de4567d4321dea_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD5cdffa4d70c92ae8772a348d4b4dcde80
SHA1d7e4bc2019827276991978c3b3ac41f98f34ee28
SHA25604c34fcb2485a640655b38a43c712492b5a680b0dbb66316cad1ad7c384d75ce
SHA5128eba70c192ae3456cf34228277843be9cef81377c67b724b69a03e368c2ed607f3211dbb343a4b6bcc14b74e30c479d3244b7e733314f97a9a0ba2a3e5a11218