Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 04:15
Behavioral task
behavioral1
Sample
3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe
-
Size
39KB
-
MD5
3343619c3fd03e8915b61966ca3c5da5
-
SHA1
b02c243a4d4beb314996e658f608038d0bf7e1d6
-
SHA256
da3255809759904c28e1e44698df0309f09b955ae4ed731bbd34b75e7b378726
-
SHA512
6390a9c9139f691c726e866d7ae207367cdf4a489f859bc83cf6edf24d9e391b2bcc1ff8bd6fd7d69da52447aeb8d8cc5ec34242794f36e96435ef836a5cd0bd
-
SSDEEP
768:1TF1BWBOZFReEzwu5OX8lYv90hRCCJgimzSZTf6s64NM:1TFyBO7t68lk0+imW0d4
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2476-0-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/2476-57-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-53-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-50-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-47-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-44-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-41-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-38-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-35-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-32-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-29-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-23-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-20-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-17-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-14-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-11-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-8-0x0000000013150000-0x0000000013162000-memory.dmp upx behavioral1/memory/1252-5-0x0000000013150000-0x0000000013162000-memory.dmp upx -
Modifies WinLogon 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\DLLName = "crypts.dll" 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\Impersonate = "1" 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\Asynchronous = "1" 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\StartShell = "Run" 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\crypts.dll 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20 PID 2476 wrote to memory of 1252 2476 3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3343619c3fd03e8915b61966ca3c5da5_JaffaCakes118.exe"2⤵
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476
-