Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
3057f902a6185c42451ff90062fea306_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3057f902a6185c42451ff90062fea306_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3057f902a6185c42451ff90062fea306_JaffaCakes118.exe
-
Size
236KB
-
MD5
3057f902a6185c42451ff90062fea306
-
SHA1
20e58eb04c628fdf98c2d1251cacc72d17fb3bd1
-
SHA256
10f830031edca98d451224dd68792fa20f767a04cec2257d12c1f1314b8e6bdc
-
SHA512
bce38792b0ced72e53082d873416636f2f6635888e1ef1a2d44bbf5f9d580e977fbc73fa2858da418ca132961442e6d7208f1c891cfff2f6e597ef9aa249bf9d
-
SSDEEP
6144:fcA7yhnTUzDpJRgzhpnwFTb+2ICrYWhesRMyNoCBz8yf3d1sWOjN//IlQXxR/f:kA/whpnwFTb+2ICr7X1+/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 948 winkernel32.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SVCHOST32 = "C:\\Arquivos de programas\\svchost32.EXE" winkernel32.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SVCHOST32 = "C:\\Arquivos de programas\\svchost32.EXE" 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\comdlg32.ocx winkernel32.EXE File opened for modification C:\Windows\SysWOW64\comdlg32.ocx winkernel32.EXE -
Drops file in Windows directory 27 IoCs
description ioc Process File created C:\Windows\inf\azul01.JPG winkernel32.EXE File created C:\Windows\inf\i07.JPG winkernel32.EXE File created C:\Windows\ansmtp.dll winkernel32.EXE File created C:\Windows\inf\anvaila.inf winkernel32.EXE File created C:\Windows\inf\r01.JPG winkernel32.EXE File created C:\Windows\inf\r02.JPG winkernel32.EXE File created C:\Windows\inf\i05.JPG winkernel32.EXE File created C:\Windows\inf\b01.JPG winkernel32.EXE File created C:\Windows\inf\b02.JPG winkernel32.EXE File opened for modification C:\Windows\inf\append.inf 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe File created C:\Windows\inf\i03.JPG winkernel32.EXE File created C:\Windows\inf\r03.JPG winkernel32.EXE File created C:\Windows\inf\gereba01.JPG winkernel32.EXE File created C:\Windows\inf\anenvia.inf winkernel32.EXE File created C:\Windows\inf\i02.JPG winkernel32.EXE File opened for modification C:\Windows\ansmtp.dll winkernel32.EXE File created C:\Windows\inf\azul02.JPG winkernel32.EXE File created C:\Windows\inf\comdlg32.inf winkernel32.EXE File created C:\Windows\inf\gereba02.JPG winkernel32.EXE File created C:\Windows\inf\i04.JPG winkernel32.EXE File opened for modification C:\Windows\ansmtpbuild.dll winkernel32.EXE File created C:\Windows\inf\anmanda.inf winkernel32.EXE File created C:\Windows\inf\i06.JPG winkernel32.EXE File opened for modification C:\Windows\inf\appstart32.inf 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe File created C:\Windows\inf\i01.JPG winkernel32.EXE File created C:\Windows\ansmtpbuild.dll winkernel32.EXE File created C:\Windows\inf\r04.JPG winkernel32.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 948 winkernel32.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2312 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 948 winkernel32.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 948 2312 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 85 PID 2312 wrote to memory of 948 2312 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 85 PID 2312 wrote to memory of 948 2312 3057f902a6185c42451ff90062fea306_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3057f902a6185c42451ff90062fea306_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3057f902a6185c42451ff90062fea306_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\winkernel32.EXEC:\winkernel32.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
90KB
MD597da1fcfd21b4aaea5c58678819d2d5d
SHA1f8ff367ba5e80f4514ae062bcfb6b850918ead55
SHA256612970b2627659d436773a5e4f1ccb24199009dc80fedd897d50f9e2570e1aa1
SHA5125d603cf50c2f4eb1e343ae8fc896238acf1d6ba0e59dba19e9c2addc78817f90390c71706e5723dc64d9748ca68644026e2725a16b0e41e758546756a98bf634
-
Filesize
236KB
MD53057f902a6185c42451ff90062fea306
SHA120e58eb04c628fdf98c2d1251cacc72d17fb3bd1
SHA25610f830031edca98d451224dd68792fa20f767a04cec2257d12c1f1314b8e6bdc
SHA512bce38792b0ced72e53082d873416636f2f6635888e1ef1a2d44bbf5f9d580e977fbc73fa2858da418ca132961442e6d7208f1c891cfff2f6e597ef9aa249bf9d