Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe
-
Size
4.0MB
-
MD5
37532cf8af70102de592c292b2a6bd76
-
SHA1
5ba072eeba22c0329c1c166462588a38549d6fe2
-
SHA256
7e026e49049e2d8e1847c91d762d7cfc5370a5b7b1d36e7a9fc46ae6d92107f3
-
SHA512
ff6ee7e2928cfd51e4a1fc5a4954ce5bf60fbb75195f884dee632624930c6f145fa7bdf1e57a522d6a7748e3f32f900854e057e21a2f5d911942930dc2f96e43
-
SSDEEP
98304:0+v5gqy7XODWOWTP6maZ+ghrcTJuwH2Fw0alYE0y0l1S+Mju4DS6H4Lj:Hvaq2zkCue2FwH+RvS+Mju76mj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 tuto.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\System32\\svchosts.exe" 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\avg = "C:\\Arquivos de programas\\avg.exe" 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\PLUG.SYS 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchosts.exe 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2180 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2728 2180 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2728 2180 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2728 2180 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2728 2180 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2712 2728 cmd.exe 32 PID 2728 wrote to memory of 2712 2728 cmd.exe 32 PID 2728 wrote to memory of 2712 2728 cmd.exe 32 PID 2728 wrote to memory of 2712 2728 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /k C:\tuto.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\tuto.exeC:\tuto.exe3⤵
- Executes dropped EXE
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5251b9e5ea854eca172eb5a1ea480c718
SHA1f2d3a641f762ebafce3fe60ba1bf764cd2a6bbec
SHA2564ea747bcd91bc5fc5025b7eb4d4cbba6672a00361285550cb4ca55ad57c95337
SHA512a850de833b3744d31ded0e72549b16614cea9f66a2c989505914de4600c4ffcde842a658d629e0980586cb2c424c3c946e148051a6c82f6ae987da8202d0f8bd