Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe
-
Size
543KB
-
MD5
2cec946711c83f10cd19da625fe9b29b
-
SHA1
5adda6c883a251bb444ba0cc9aafa4998e10e00f
-
SHA256
4ea8de3128a42108f14519c9a24221bd212e6893e1646b05723c4717ac3e6fc4
-
SHA512
cd784186cf158a1cb7f176316939f2aee9d2bbfb293f473dcfa354a86c46cfad90e6c7d58d585b93d31b9e94e945cac92035a5e09ce4942c8600bc69d02cd644
-
SSDEEP
12288:nOI2YpeqiR9mDny7aD44g+QF8GlF3Z4mxxoLeP6MzEUkdjqo:B2Ypl09q0aD44+QmXoCyq2Rqo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 muqiu -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\muqiu 2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe File opened for modification C:\Windows\muqiu 2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe File created C:\Windows\Delete.bat 2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ muqiu Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" muqiu Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" muqiu Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" muqiu Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" muqiu -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 muqiu -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3944 3356 2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe 86 PID 3356 wrote to memory of 3944 3356 2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe 86 PID 3356 wrote to memory of 3944 3356 2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe 86 PID 1676 wrote to memory of 2260 1676 muqiu 87 PID 1676 wrote to memory of 2260 1676 muqiu 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2cec946711c83f10cd19da625fe9b29b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:3944
-
-
C:\Windows\muqiuC:\Windows\muqiu1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2260
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5143874551bc96c84943f98d4000e5f00
SHA11361434eaeec59d8e0d423f6cc9b5031c955afda
SHA25661a815c30cc82f0400d9c52f79b194e5def34136bc83538a1cde7399bd082d79
SHA512fa9fa729b6f3d2f112fe709070d4fd4d364eaca54f86cab09b99e04d3f07df85483e5f3f830becc48e255f13d4a9b68949a97d6c78d8df92382b8fa92b4c357b
-
Filesize
543KB
MD52cec946711c83f10cd19da625fe9b29b
SHA15adda6c883a251bb444ba0cc9aafa4998e10e00f
SHA2564ea8de3128a42108f14519c9a24221bd212e6893e1646b05723c4717ac3e6fc4
SHA512cd784186cf158a1cb7f176316939f2aee9d2bbfb293f473dcfa354a86c46cfad90e6c7d58d585b93d31b9e94e945cac92035a5e09ce4942c8600bc69d02cd644