Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe
-
Size
356KB
-
MD5
2f918d48b38e41348e447f0ee7aea55e
-
SHA1
e12d4270b0facffb27eefc38fef7975bb6f3f99f
-
SHA256
d4887faacd086f7d6127cdab7e540c706444c024e3084c05a6e34c2b7e08f413
-
SHA512
93442e264ad817c8222b70e9fb9763daa7dbe49070ab0279b5a5523ccdc27550792db993bd3791ef58093e81d4f7ab2478d3108eb148fc3d6b15a945c3c49926
-
SSDEEP
6144:7vbx8Cg6KHJ41R/DRqYaZZlM9RpJ+kxiDE3k:7tectErZe9DJi43
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2736 Arl5yuDQdTkHEUZ.exe -
Executes dropped EXE 2 IoCs
pid Process 2840 Arl5yuDQdTkHEUZ.exe 2736 Arl5yuDQdTkHEUZ.exe -
Loads dropped DLL 5 IoCs
pid Process 2380 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 2380 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 2380 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 2840 Arl5yuDQdTkHEUZ.exe 2736 Arl5yuDQdTkHEUZ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\jjX5GqSY0FpMRC = "C:\\ProgramData\\uvAt53WdGwYmpDRb\\Arl5yuDQdTkHEUZ.exe" 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2072 set thread context of 2380 2072 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 30 PID 2840 set thread context of 2736 2840 Arl5yuDQdTkHEUZ.exe 32 PID 2736 set thread context of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2380 2072 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2380 2072 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2380 2072 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2380 2072 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2380 2072 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2380 2072 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2840 2380 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2840 2380 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2840 2380 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2840 2380 2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe 31 PID 2840 wrote to memory of 2736 2840 Arl5yuDQdTkHEUZ.exe 32 PID 2840 wrote to memory of 2736 2840 Arl5yuDQdTkHEUZ.exe 32 PID 2840 wrote to memory of 2736 2840 Arl5yuDQdTkHEUZ.exe 32 PID 2840 wrote to memory of 2736 2840 Arl5yuDQdTkHEUZ.exe 32 PID 2840 wrote to memory of 2736 2840 Arl5yuDQdTkHEUZ.exe 32 PID 2840 wrote to memory of 2736 2840 Arl5yuDQdTkHEUZ.exe 32 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33 PID 2736 wrote to memory of 2152 2736 Arl5yuDQdTkHEUZ.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f918d48b38e41348e447f0ee7aea55e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\ProgramData\uvAt53WdGwYmpDRb\Arl5yuDQdTkHEUZ.exe"C:\ProgramData\uvAt53WdGwYmpDRb\Arl5yuDQdTkHEUZ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\ProgramData\uvAt53WdGwYmpDRb\Arl5yuDQdTkHEUZ.exe"C:\ProgramData\uvAt53WdGwYmpDRb\Arl5yuDQdTkHEUZ.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe"C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe" /i:27365⤵PID:2152
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD52f918d48b38e41348e447f0ee7aea55e
SHA1e12d4270b0facffb27eefc38fef7975bb6f3f99f
SHA256d4887faacd086f7d6127cdab7e540c706444c024e3084c05a6e34c2b7e08f413
SHA51293442e264ad817c8222b70e9fb9763daa7dbe49070ab0279b5a5523ccdc27550792db993bd3791ef58093e81d4f7ab2478d3108eb148fc3d6b15a945c3c49926