Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
37f3b8d911288cab2153d31fbbb4cfa3
-
SHA1
95007a502f334750b29087e880e3d8e7584bfdd1
-
SHA256
e01a7d767803819e4909e95c0d31c45307eac120275b0fd2a12413f43b8dd17e
-
SHA512
b3fb688cf6e9ef88c52717a47cc5607b70b5860aeb95763a4a04a4f09e12bab38aeec2d92e2d92adf0f3f9728dc6bd987431734126e62de4ec44aac143013ee8
-
SSDEEP
49152:H+DOKxlhI1VF4YCO3E/3FLvx25Ev/HdefnbPVHjEp3ifUs2WUH7AAzWTci:Hl2YB3E/VLv05E+nbPVZfUs2phz4c
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Wapp = "C:\\Arquivos de programas\\Wapp.exe" 37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1412 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2480 37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1412 2480 37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1412 2480 37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1412 2480 37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe 31 PID 2480 wrote to memory of 1412 2480 37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37f3b8d911288cab2153d31fbbb4cfa3_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system2⤵
- Scheduled Task/Job: Scheduled Task
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1