Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe
-
Size
116KB
-
MD5
313abf1b03ce34ae416eb583570ecfdb
-
SHA1
5d56a2d723bb9288c6ea657008014004b4b081b4
-
SHA256
d2c32b4cea85d303cfc8793bb331372fa2ead29bc57e19dd702bf06f0a28f938
-
SHA512
2e05ec3c4b6a0e1326051611a14694630cdec311d4400354ae549d5abbed5bb25bdb75957f4723723cce712ebd4abc04e7ec158c13138b8c2e0c752e030f7206
-
SSDEEP
3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5T/U:SZRcx5VMpOKXur2Qf+5T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2392 Zmusaa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Zmusaa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe File created C:\Windows\Zmusaa.exe 313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe File opened for modification C:\Windows\Zmusaa.exe 313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Zmusaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\Main Zmusaa.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Microsoft\Internet Explorer\International Zmusaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe 2392 Zmusaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 688 wrote to memory of 2392 688 313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe 84 PID 688 wrote to memory of 2392 688 313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe 84 PID 688 wrote to memory of 2392 688 313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\313abf1b03ce34ae416eb583570ecfdb_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\Zmusaa.exeC:\Windows\Zmusaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD5df8fe7e27eaf576df6c341fd16f4719d
SHA1d7e4785b9210e488ff136b9ef7ea7a6b3517ee3b
SHA256ed1714199dfbd4228bc1ef69f44439fd7d23c8c23b8085405b71696330329abc
SHA51281a36ef20bb3ee557b4c7e73201463607cfcf621272425ea49bcc9a01e930fcab18265a0a3ba9fb9a17df7f60dbf3c78ecfe6959a65555ec2bfd2192fa6cba2b
-
Filesize
116KB
MD5313abf1b03ce34ae416eb583570ecfdb
SHA15d56a2d723bb9288c6ea657008014004b4b081b4
SHA256d2c32b4cea85d303cfc8793bb331372fa2ead29bc57e19dd702bf06f0a28f938
SHA5122e05ec3c4b6a0e1326051611a14694630cdec311d4400354ae549d5abbed5bb25bdb75957f4723723cce712ebd4abc04e7ec158c13138b8c2e0c752e030f7206