Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe
-
Size
706KB
-
MD5
360424d8a405630352c1e411ebe5d1dc
-
SHA1
0538c1fb127f7d75baea77633601f7494d229960
-
SHA256
ed133664e282b53e3bf37c31d0842005221a8285f0acc219b0647d97f55bdb29
-
SHA512
f0460ceb0753e29993accbd17c8cd9f9d0dd8610a44d7b11ad171b9e20cfa14475436125142ccf76eee53fffc17f51aa0080bf0c60235d786e0d81b6dc938896
-
SSDEEP
12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGspz7b4WdVqXFrwam:gpQ/6trYlvYPK+lqD73TeGspzI2QX93m
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 ScrBlaze.scr -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\s18273659 ScrBlaze.scr File created C:\Windows\s18273659 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe File opened for modification C:\Windows\s18273659 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe File created C:\Windows\ScrBlaze.scr 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe File created C:\Windows\s18273659 ScrBlaze.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\ScrBlaze.scr" 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main ScrBlaze.scr -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2732 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe 2732 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe 2716 ScrBlaze.scr 2716 ScrBlaze.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2716 2732 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2716 2732 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2716 2732 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2716 2732 360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\360424d8a405630352c1e411ebe5d1dc_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\ScrBlaze.scr"C:\Windows\ScrBlaze.scr" /S2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78B
MD5a7e0f6c82be31ec4cc676591a51ed3dd
SHA1b1bbca10a33bec09ae94e698b483fd9c6baba3ec
SHA256d894e86b5210744186f9f816fa9dd1b1d0e343cdb213bad08ef73678f6a4e68e
SHA512cfa2579da04eaaf333191d2879deb7ba1fee202eacf32dce72a7b1e37afd05c313535f547231ea71d336dca9a7ea53f67da7c89eecc7038133104eba95d63322
-
Filesize
706KB
MD5360424d8a405630352c1e411ebe5d1dc
SHA10538c1fb127f7d75baea77633601f7494d229960
SHA256ed133664e282b53e3bf37c31d0842005221a8285f0acc219b0647d97f55bdb29
SHA512f0460ceb0753e29993accbd17c8cd9f9d0dd8610a44d7b11ad171b9e20cfa14475436125142ccf76eee53fffc17f51aa0080bf0c60235d786e0d81b6dc938896
-
Filesize
883B
MD5c0f6ee6b8478688e7230037aafc2580a
SHA13fdbc7582505bb0125f1fb0dec8e8b38d45d32fb
SHA256f73221a8630eded9c59848284e45104976ecfed4cd4152cb6292f1a5604cb978
SHA51210d1c87f056c325007417b57fc4bebfb66c464635857cf36c21e9afeb267b12aa328ea95af1a95fdbdff4e0077909796cbe3c2d4168b95ac5b7d610a021ce42e
-
Filesize
851B
MD5552cbc30f323135fd23bfcb8ca99191d
SHA17492978c3612c14df9dd7be556d103e824194fd0
SHA2564845c73aa45f2fba3ef931b5141af6bc0a132e9515dec804e438115117d6f88b
SHA5127669bf5a2d6d485518a9910db1926de7087aa9fcbaabfd068e67c5c3e222f5dfeb00e704d02890678923cdc22eb9f1867d3ecb55d527d8ceb8b3264444bb1f59