Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe
-
Size
305KB
-
MD5
2ef36f6a9f555eccd648eedffeb19f04
-
SHA1
453ae1972f3e8018544385d982376cb49b11f80e
-
SHA256
54a6d56c754e18af8356cf0a6c96f981fc5109c1824757fc57c254d9c6ea18dd
-
SHA512
98db6ee8a163752339ba2b9eb99d7a6fff0f6168a50bcd1101baeeb5e640d6e15e57b975ae04ba8941e745243e9c086abb2a6bb8254bc23278cee21483031091
-
SSDEEP
6144:5GSz8T72Y0SBzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOJPECYeixlYGicg:5GqA7SSYYsY1UMqMZJYSN7wbstOJ8fvi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2176 sybu.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{75DA6328-6F30-AD4F-96DD-2BAD86C808B0} = "C:\\Users\\Admin\\AppData\\Roaming\\Acheo\\sybu.exe" sybu.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe 2176 sybu.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2176 2864 2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2176 2864 2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2176 2864 2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe 30 PID 2864 wrote to memory of 2176 2864 2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe 30 PID 2176 wrote to memory of 1096 2176 sybu.exe 19 PID 2176 wrote to memory of 1096 2176 sybu.exe 19 PID 2176 wrote to memory of 1096 2176 sybu.exe 19 PID 2176 wrote to memory of 1096 2176 sybu.exe 19 PID 2176 wrote to memory of 1096 2176 sybu.exe 19 PID 2176 wrote to memory of 1168 2176 sybu.exe 20 PID 2176 wrote to memory of 1168 2176 sybu.exe 20 PID 2176 wrote to memory of 1168 2176 sybu.exe 20 PID 2176 wrote to memory of 1168 2176 sybu.exe 20 PID 2176 wrote to memory of 1168 2176 sybu.exe 20 PID 2176 wrote to memory of 1200 2176 sybu.exe 21 PID 2176 wrote to memory of 1200 2176 sybu.exe 21 PID 2176 wrote to memory of 1200 2176 sybu.exe 21 PID 2176 wrote to memory of 1200 2176 sybu.exe 21 PID 2176 wrote to memory of 1200 2176 sybu.exe 21 PID 2176 wrote to memory of 1644 2176 sybu.exe 24 PID 2176 wrote to memory of 1644 2176 sybu.exe 24 PID 2176 wrote to memory of 1644 2176 sybu.exe 24 PID 2176 wrote to memory of 1644 2176 sybu.exe 24 PID 2176 wrote to memory of 1644 2176 sybu.exe 24 PID 2176 wrote to memory of 2864 2176 sybu.exe 29 PID 2176 wrote to memory of 2864 2176 sybu.exe 29 PID 2176 wrote to memory of 2864 2176 sybu.exe 29 PID 2176 wrote to memory of 2864 2176 sybu.exe 29 PID 2176 wrote to memory of 2864 2176 sybu.exe 29 PID 2176 wrote to memory of 2264 2176 sybu.exe 32 PID 2176 wrote to memory of 2264 2176 sybu.exe 32 PID 2176 wrote to memory of 2264 2176 sybu.exe 32 PID 2176 wrote to memory of 2264 2176 sybu.exe 32 PID 2176 wrote to memory of 2264 2176 sybu.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ef36f6a9f555eccd648eedffeb19f04_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\Acheo\sybu.exe"C:\Users\Admin\AppData\Roaming\Acheo\sybu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD5d35627c824005f32d2644e945c65ae5c
SHA1b476a7acf8e188d56262bbca907b24026152085c
SHA2567f8f4bd2600d281cb9f24b3b4bbbf0700dee3b4e919a84c59ffca3871b14112d
SHA512e9aba5bfed4b487437749b6612ffe10f48ef74c9e06b2044216b199b5aa0386022d56154531009ddbfad6d3970cded5f945433680eb81c203496d1675dd5e126