Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
365449e609f7559239b7f46647c448d5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
365449e609f7559239b7f46647c448d5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
365449e609f7559239b7f46647c448d5_JaffaCakes118.exe
-
Size
15KB
-
MD5
365449e609f7559239b7f46647c448d5
-
SHA1
8ce96461681284b48fce8b68d4a8a6edbd6c95e8
-
SHA256
2c703161eeb6061dd827c47db2dea938042ff0965777a40a1c541fa111b726a7
-
SHA512
edb78f186ec8380561268d659bcbf59266a144d0983da4cba80bb00cda5e9ea10a1b60f63c8cda1582469e3394f26cea551a6847150d35befe097be08416d48c
-
SSDEEP
384:DaC+kfbi9C74+r1D+zOiQuAuWxjJMnHQm9jexTvj0iEhTGN:mfa6C8+r5+ihKnHQmoRbPEdM
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2324 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\isndntio = "C:\\Windows\\isndntio.exe" 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\isndntio.dll 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\isndntio.exe 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe File opened for modification C:\Windows\isndntio.exe 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2324 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2324 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1228 2324 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe 21 PID 2324 wrote to memory of 1228 2324 365449e609f7559239b7f46647c448d5_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\365449e609f7559239b7f46647c448d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\365449e609f7559239b7f46647c448d5_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD52dd4610e8ff5231fc884ab01c6a918ee
SHA11b4bcab970bf97ce5422ccbd42d4fd1df3e0b4cf
SHA256f20990d6fbea65ecc13c1c2fd581f61a0760f776879d2fee4a55d95195c61a91
SHA512c43404544f6cc33affcf09142bfc6da2bcd7bf2e0363c7a25a8da956a149acff3d3abc08fd1e460228a607717537428635e381b043da721ea211802939d6a730