Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
3b126937a30a14d414910eec72688142_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b126937a30a14d414910eec72688142_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b126937a30a14d414910eec72688142_JaffaCakes118.exe
-
Size
76KB
-
MD5
3b126937a30a14d414910eec72688142
-
SHA1
631793a8f54b011a69feade1da17d4d01c9385fe
-
SHA256
10e74a5346fe3d20de68a0041fdfeb534a34dd7ce53992cb78c3e1bc418bced6
-
SHA512
d6fa7f45837049c20f39ccede0676b73047a7c1ed8a2d59b526fe2d2c034ebb0d4bab694e608eb362e63cff2f75be8502c9908b836de3abca4a7e27af6d6f166
-
SSDEEP
768:lEks4rinb4Pi/6kYtJ8brlqRiDPWTR/k/6cK6zoSeMbR4VWVu6lqT12TYnokAV4R:lU4rR6SkYvTK6g3enVIuaqizk0s
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2680 galle.exe -
Loads dropped DLL 2 IoCs
pid Process 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\galle.exe 3b126937a30a14d414910eec72688142_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1304 set thread context of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31 PID 1304 wrote to memory of 2680 1304 3b126937a30a14d414910eec72688142_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b126937a30a14d414910eec72688142_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b126937a30a14d414910eec72688142_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\galle.exeC:\Windows\system32\galle.exe2⤵
- Executes dropped EXE
PID:2680
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD58abe3fcfe0791df040abbe85c03a6c97
SHA101d4ac44a4ba9edd9998f8be0ec1354c3df511c4
SHA256986b81412273a2cb454db21088ebc13e7db11af08f1cb9b6eb00ec379a604e91
SHA512c6e48e50a7045bb5a56d67722d2087a244d47bed5dec4dfb19140cf9cd43d1990344aae24354417452f37ba35611233ad5e28f41d174b7e0a7268ae891ff7c57