Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe
-
Size
165KB
-
MD5
35960ae2c6844a0ad7409001ab24c529
-
SHA1
187076e2be69f348c3d36ac7f1d8b1f678510df9
-
SHA256
9b1f8ae6a856479a60e21e8e46247e07ce4d39ff5b85f1ec353e8102dd72eb2d
-
SHA512
f893f7a140728d19fbb4c138d08462d8c5427af06a8926ef6d038da9448ad885bedf2f37d1cf08aa6b305599ebcb02dc7901f7ff3c0033836783652d2611ff18
-
SSDEEP
3072:XIdcFLEdskgrt05bnwhVh6PTPmBThS92nLv:YWjZ0xCVh6yBtS92Lv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2232 idemoodp0cetka.exe 2828 idemoodp0cetka.exe -
Loads dropped DLL 3 IoCs
pid Process 1920 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 1920 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 2232 idemoodp0cetka.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2368 set thread context of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2232 set thread context of 2828 2232 idemoodp0cetka.exe 31 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 2232 idemoodp0cetka.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 2368 wrote to memory of 1920 2368 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 29 PID 1920 wrote to memory of 2232 1920 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2232 1920 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2232 1920 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2232 1920 35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31 PID 2232 wrote to memory of 2828 2232 idemoodp0cetka.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35960ae2c6844a0ad7409001ab24c529_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
PID:2828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD535960ae2c6844a0ad7409001ab24c529
SHA1187076e2be69f348c3d36ac7f1d8b1f678510df9
SHA2569b1f8ae6a856479a60e21e8e46247e07ce4d39ff5b85f1ec353e8102dd72eb2d
SHA512f893f7a140728d19fbb4c138d08462d8c5427af06a8926ef6d038da9448ad885bedf2f37d1cf08aa6b305599ebcb02dc7901f7ff3c0033836783652d2611ff18