Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 19:13
Behavioral task
behavioral1
Sample
2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe
-
Size
160KB
-
MD5
2d816510c04e5fe03f86b2b3f6ef44aa
-
SHA1
06df091597fc12b86d03340c75805facc95cd678
-
SHA256
9f40c605ceecc8f1f2a86c2afc42e9c5293b2be56a58b5b4895bdca4f6d5e465
-
SHA512
9f800458fe131da8186173f98a7127b3718b054109996b7b3b9d312458953d5575b7d5f6bc651353598bb27476d6795eeba52b81f59cff7ee5269dcf10fbd35d
-
SSDEEP
1536:OEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:FY+4MiIkLZJNAQ9J6v
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1052-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\2D0D02E8 = "C:\\Users\\Admin\\AppData\\Roaming\\2D0D02E8\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe 1668 winver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 1668 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exewinver.exedescription pid process target process PID 1052 wrote to memory of 1668 1052 2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe winver.exe PID 1052 wrote to memory of 1668 1052 2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe winver.exe PID 1052 wrote to memory of 1668 1052 2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe winver.exe PID 1052 wrote to memory of 1668 1052 2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe winver.exe PID 1052 wrote to memory of 1668 1052 2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe winver.exe PID 1668 wrote to memory of 1392 1668 winver.exe Explorer.EXE PID 1668 wrote to memory of 1232 1668 winver.exe taskhost.exe PID 1668 wrote to memory of 1336 1668 winver.exe Dwm.exe PID 1668 wrote to memory of 1392 1668 winver.exe Explorer.EXE PID 1668 wrote to memory of 932 1668 winver.exe DllHost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d816510c04e5fe03f86b2b3f6ef44aa_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\winver.exewinver3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/932-29-0x0000000001FF0000-0x0000000001FF6000-memory.dmpFilesize
24KB
-
memory/932-30-0x0000000076D41000-0x0000000076D42000-memory.dmpFilesize
4KB
-
memory/932-24-0x0000000001FF0000-0x0000000001FF6000-memory.dmpFilesize
24KB
-
memory/1052-12-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1052-1-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB
-
memory/1052-0-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1052-5-0x0000000001CF0000-0x00000000026F0000-memory.dmpFilesize
10.0MB
-
memory/1052-13-0x0000000001CF0000-0x00000000026F0000-memory.dmpFilesize
10.0MB
-
memory/1232-25-0x0000000001BC0000-0x0000000001BC6000-memory.dmpFilesize
24KB
-
memory/1232-26-0x0000000076D41000-0x0000000076D42000-memory.dmpFilesize
4KB
-
memory/1336-20-0x00000000001A0000-0x00000000001A6000-memory.dmpFilesize
24KB
-
memory/1336-27-0x00000000001A0000-0x00000000001A6000-memory.dmpFilesize
24KB
-
memory/1392-4-0x0000000002260000-0x0000000002266000-memory.dmpFilesize
24KB
-
memory/1392-3-0x0000000002260000-0x0000000002266000-memory.dmpFilesize
24KB
-
memory/1392-2-0x0000000002260000-0x0000000002266000-memory.dmpFilesize
24KB
-
memory/1392-28-0x0000000002250000-0x0000000002256000-memory.dmpFilesize
24KB
-
memory/1392-10-0x0000000076D41000-0x0000000076D42000-memory.dmpFilesize
4KB
-
memory/1392-22-0x0000000002250000-0x0000000002256000-memory.dmpFilesize
24KB
-
memory/1668-9-0x0000000076EEF000-0x0000000076EF1000-memory.dmpFilesize
8KB
-
memory/1668-6-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB
-
memory/1668-8-0x0000000076EEF000-0x0000000076EF0000-memory.dmpFilesize
4KB
-
memory/1668-11-0x0000000076CF0000-0x0000000076E99000-memory.dmpFilesize
1.7MB
-
memory/1668-7-0x0000000076EF0000-0x0000000076EF1000-memory.dmpFilesize
4KB
-
memory/1668-35-0x0000000000090000-0x0000000000096000-memory.dmpFilesize
24KB