Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe
-
Size
6.2MB
-
MD5
3354c19e87e052e4ac053a096c523a0f
-
SHA1
6aa72d1b3c47e38c2099ce52d502223c11baa067
-
SHA256
54aabeaa5e24f2e75247438b2dbe08843224a4aa608dc4405d08a36bd858caa4
-
SHA512
344dc95b86417c07b13bf65c9f2649589f41ac79bf5f7be599f872c6e0f3e85453838f100ee7b3432dc202f8a499909666a2deff23b74453b922f48842cc6d4a
-
SSDEEP
49152:EQFRHrmQG+dQG+QrzrmQG+dQG+X+dQG+9rpQG+dQGuG+XrmQRQG+dQG+X+dQG+9I:EcKewe9aeh+e9aeBaehl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1592 ufogy.exe -
Loads dropped DLL 2 IoCs
pid Process 1948 3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe 1948 3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main ufogy.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 ufogy.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1592 ufogy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1592 ufogy.exe 1592 ufogy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1592 1948 3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe 31 PID 1948 wrote to memory of 1592 1948 3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe 31 PID 1948 wrote to memory of 1592 1948 3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe 31 PID 1948 wrote to memory of 1592 1948 3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\ufogy.exeC:\Users\Admin\AppData\Local\Temp\ufogy.exe -run C:\Users\Admin\AppData\Local\Temp\3354c19e87e052e4ac053a096c523a0f_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD57eb38a5101fefebcb47ef9d68f8a9a05
SHA1147160a570e6b8cc244df97bd64d1f215e2bcb17
SHA256e41bd9e8f7d20d61d019d739f39cdcec0593867c67ac221e0021bab21db493c3
SHA5124af22aeea4e793191bab442a4d2f5a421daf1217f059e133480ce09d8ccb62928cb92d9a3242134a8afa2525c7b36db33b5e61c42256cfb75f556cfbad7fb5c2