Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 18:18
Behavioral task
behavioral1
Sample
35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe
-
Size
158KB
-
MD5
35d88b1235c23fb89270d76eb2a54fb5
-
SHA1
bc2efd5cf1e070ccc5b246bcb322d625adae0c2a
-
SHA256
5a6053bb8f7969bf750e422a7948a9772c2e28256b358cb4921ca63c76b56473
-
SHA512
00c402c92be028ad3dc4cfca5fd474db3c7d890b12626367f5dabf850054524677377e8e3dc767140f8391628d3ee21c66dbfa80dd525efd0fc144884bf97fd6
-
SSDEEP
3072:WA6Ucj4OV5/wqlltLqX9JZvfZLCY3Ioub4LQnG/aKqkcyhva:WA+j4WRlltLqNPvHvutG/aKqohC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 Szyhoa.exe -
resource yara_rule behavioral1/memory/1820-0-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/files/0x0007000000015605-8.dat upx behavioral1/memory/1984-10-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe File created C:\Windows\Szyhoa.exe 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe File opened for modification C:\Windows\Szyhoa.exe 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Szyhoa.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Szyhoa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main Szyhoa.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International Szyhoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe 1984 Szyhoa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1984 1820 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe 31 PID 1820 wrote to memory of 1984 1820 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe 31 PID 1820 wrote to memory of 1984 1820 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe 31 PID 1820 wrote to memory of 1984 1820 35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35d88b1235c23fb89270d76eb2a54fb5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\Szyhoa.exeC:\Windows\Szyhoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD535d88b1235c23fb89270d76eb2a54fb5
SHA1bc2efd5cf1e070ccc5b246bcb322d625adae0c2a
SHA2565a6053bb8f7969bf750e422a7948a9772c2e28256b358cb4921ca63c76b56473
SHA51200c402c92be028ad3dc4cfca5fd474db3c7d890b12626367f5dabf850054524677377e8e3dc767140f8391628d3ee21c66dbfa80dd525efd0fc144884bf97fd6
-
Filesize
372B
MD51ba08867cc27c1f8a0d226f90ef03598
SHA12dfc6a822a2fe0e826c54a9a2fe6c58712d02af5
SHA2567284f79462856734c4baa879b235ba33a1c728fe0e48af2964d0eb5e083b8cb4
SHA512abff5fe99fb19b464acaa7215a8e5006e520a29fce769b59c79960dc2908ddc42a9f601007bb3e94301be6cbd843f67ccfceb2b05f0600151d4623565425a286