Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
3057f902a6185c42451ff90062fea306_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3057f902a6185c42451ff90062fea306_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3057f902a6185c42451ff90062fea306_JaffaCakes118.exe
-
Size
236KB
-
MD5
3057f902a6185c42451ff90062fea306
-
SHA1
20e58eb04c628fdf98c2d1251cacc72d17fb3bd1
-
SHA256
10f830031edca98d451224dd68792fa20f767a04cec2257d12c1f1314b8e6bdc
-
SHA512
bce38792b0ced72e53082d873416636f2f6635888e1ef1a2d44bbf5f9d580e977fbc73fa2858da418ca132961442e6d7208f1c891cfff2f6e597ef9aa249bf9d
-
SSDEEP
6144:fcA7yhnTUzDpJRgzhpnwFTb+2ICrYWhesRMyNoCBz8yf3d1sWOjN//IlQXxR/f:kA/whpnwFTb+2ICr7X1+/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2976 winkernel32.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\SVCHOST32 = "C:\\Arquivos de programas\\svchost32.EXE" winkernel32.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\SVCHOST32 = "C:\\Arquivos de programas\\svchost32.EXE" 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\comdlg32.ocx winkernel32.EXE File opened for modification C:\Windows\SysWOW64\comdlg32.ocx winkernel32.EXE -
Drops file in Windows directory 27 IoCs
description ioc Process File created C:\Windows\inf\b02.JPG winkernel32.EXE File opened for modification C:\Windows\ansmtp.dll winkernel32.EXE File created C:\Windows\inf\i01.JPG winkernel32.EXE File created C:\Windows\inf\i03.JPG winkernel32.EXE File created C:\Windows\inf\i02.JPG winkernel32.EXE File created C:\Windows\inf\i05.JPG winkernel32.EXE File created C:\Windows\inf\gereba01.JPG winkernel32.EXE File opened for modification C:\Windows\ansmtpbuild.dll winkernel32.EXE File created C:\Windows\inf\anenvia.inf winkernel32.EXE File created C:\Windows\inf\anvaila.inf winkernel32.EXE File created C:\Windows\inf\comdlg32.inf winkernel32.EXE File created C:\Windows\inf\azul01.JPG winkernel32.EXE File opened for modification C:\Windows\inf\appstart32.inf 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe File created C:\Windows\inf\r02.JPG winkernel32.EXE File created C:\Windows\inf\r03.JPG winkernel32.EXE File created C:\Windows\inf\b01.JPG winkernel32.EXE File opened for modification C:\Windows\inf\append.inf 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe File created C:\Windows\inf\gereba02.JPG winkernel32.EXE File created C:\Windows\inf\r04.JPG winkernel32.EXE File created C:\Windows\inf\i07.JPG winkernel32.EXE File created C:\Windows\ansmtpbuild.dll winkernel32.EXE File created C:\Windows\inf\anmanda.inf winkernel32.EXE File created C:\Windows\inf\r01.JPG winkernel32.EXE File created C:\Windows\inf\i04.JPG winkernel32.EXE File created C:\Windows\inf\i06.JPG winkernel32.EXE File created C:\Windows\ansmtp.dll winkernel32.EXE File created C:\Windows\inf\azul02.JPG winkernel32.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 winkernel32.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 2976 winkernel32.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2976 1988 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2976 1988 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2976 1988 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 31 PID 1988 wrote to memory of 2976 1988 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3057f902a6185c42451ff90062fea306_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3057f902a6185c42451ff90062fea306_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\winkernel32.EXEC:\winkernel32.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NIUC9X25\gereba01[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
90KB
MD5f7c2ad3d15223dabac97ca3eb161068a
SHA118b04c1dc97f6a05a34dbc22d34e8305360943d0
SHA256095c11a4caf99865699fa1767aadc0089c264f6a978654ad76f164176158022b
SHA512d1e31491a598646d299472f5279aa09f1227b666c2baab723b311023499e476328559d0abb741ad2381c60ab9c74b71f81f6a9dd3002cd25146758403b9ce3ee
-
Filesize
236KB
MD53057f902a6185c42451ff90062fea306
SHA120e58eb04c628fdf98c2d1251cacc72d17fb3bd1
SHA25610f830031edca98d451224dd68792fa20f767a04cec2257d12c1f1314b8e6bdc
SHA512bce38792b0ced72e53082d873416636f2f6635888e1ef1a2d44bbf5f9d580e977fbc73fa2858da418ca132961442e6d7208f1c891cfff2f6e597ef9aa249bf9d