Analysis
-
max time kernel
92s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe
-
Size
22KB
-
MD5
2bf4e1940426b155a40f7c7a9de94196
-
SHA1
0f1c4dc84c8afbc557c8fb43f6e304e41c7edb70
-
SHA256
360e5c8184e9a03f413ca39ba1e86f4dc139db27b9c7b2d42eb0764266d8d58e
-
SHA512
f61af64d63c4aa123fc23d35cc24fa295e4fff7cdb3ad0a77f9e06c0db31aa06fce61ab3aa2cef49c6d9e7e1c4ab7ed0e41ce788c336a979d9fdeb9bc1014970
-
SSDEEP
384:ecnE0N9TugdeVfaO+BWVHcufg/1uR07MGLfBGmFRRZYcfH6kLmy:ecnHN9T9eBgWVHcufs8+7zVGa1Y8vLmy
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Internet Explorer\L = c0999299dad299919981d2d3819ac899909ad299979981d2d3918f91938c96819ac899909ad299939981c6d4c8c3819ad29992979981daa39493a3a39897a28c91a3a2988c93a594a58c98a28fa58ca4a1a496a5a398a595a095a0dc819adc5f000000 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 640 wrote to memory of 3676 640 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 88 PID 640 wrote to memory of 3676 640 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 88 PID 640 wrote to memory of 3676 640 2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bf4e1940426b155a40f7c7a9de94196_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\update.bat2⤵PID:3676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD5642214b8c2b0409ad09f314bf74e5a83
SHA1c0398ad5ea81b880f7725b4ead9e5a66676bd400
SHA256acbfc4a2b0d528729ca227ed5844947d3d936a961b0d6f5911e14530dbbb984d
SHA512e0d7be7f998bbb626993efd4b9ef1dd4afbad1ec4ba0a82d49ac1ab3ce7ef76c42d23c379e0d61afa004a1d49811c4c5f707bdbc318637376b64a19eae298461