Analysis
-
max time kernel
124s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 01:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
4 signatures
150 seconds
General
-
Target
2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe
-
Size
93KB
-
MD5
2a8f832899c158395f951bb38b1a0af9
-
SHA1
493b9f1d6c98a137b97ba4cb79138f0592056415
-
SHA256
43e7d995002245d9d93b2a0f96a8565917e8f478e875dc3187c5d0a8436be579
-
SHA512
f699bb2f35e277416f781f7676921351b6b1c81a00db710a582853df4eebdad0d1f3481ae81855290babf22e8bfdcc8d7083acde54f30ffb07e5f09f4d281d0d
-
SSDEEP
1536:4rUlDSCPWWum6e6mm/ASwwb5RUUgFeH6P5gLIh9XqfjutgyEve0nVPHTJKqOiN:Y8DTOWuhe69/Xwwb5RUUgFeHk5/h93M5
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\TEMP\\services.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msmmsgr = "C:\\Windows\\TEMP\\x\\services.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3924 set thread context of 3916 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 93 -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2396 reg.exe 2236 reg.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3924 wrote to memory of 2328 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 91 PID 3924 wrote to memory of 2328 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 91 PID 3924 wrote to memory of 2328 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 91 PID 3924 wrote to memory of 3744 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 92 PID 3924 wrote to memory of 3744 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 92 PID 3924 wrote to memory of 3744 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 92 PID 3924 wrote to memory of 3916 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 93 PID 3924 wrote to memory of 3916 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 93 PID 3924 wrote to memory of 3916 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 93 PID 3924 wrote to memory of 3916 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 93 PID 3924 wrote to memory of 3916 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 93 PID 3924 wrote to memory of 3916 3924 2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe 93 PID 2328 wrote to memory of 2236 2328 cmd.exe 96 PID 2328 wrote to memory of 2236 2328 cmd.exe 96 PID 2328 wrote to memory of 2236 2328 cmd.exe 96 PID 3744 wrote to memory of 2396 3744 cmd.exe 97 PID 3744 wrote to memory of 2396 3744 cmd.exe 97 PID 3744 wrote to memory of 2396 3744 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2a8f832899c158395f951bb38b1a0af9_JaffaCakes118.exe2⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4084,i,1468394940417093286,13535766203427582426,262144 --variations-seed-version --mojo-platform-channel-handle=3744 /prefetch:81⤵PID:2664