Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe
-
Size
178KB
-
MD5
38ae37ad96f07d93b71d5e14f7d54f53
-
SHA1
b68888dbab6dbc9ecc6ca308c70bfd77bf3e31d3
-
SHA256
44eb3271aa56f12aff0461b7e7e797dd352e495d44afb4a3e1cd095ae5c2a95c
-
SHA512
f49939a4ee613893a1837ccad779449a7dae377e889d9c08ade78e3bf97bb47448cc570e5334f05499dee32014b51f55ec63018ef80f7f8d55ddfb92985fce2a
-
SSDEEP
3072:u0Gox2PD7tC6PNDk/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPoWqGU/n6CbzGcBIMHIGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2824 Fcadea.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\TJHTHX1O7X = "C:\\Windows\\Fcadea.exe" Fcadea.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe File created C:\Windows\Fcadea.exe 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe File opened for modification C:\Windows\Fcadea.exe 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main Fcadea.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International Fcadea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe 2824 Fcadea.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2824 2840 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2824 2840 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2824 2840 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2824 2840 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2824 2840 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2824 2840 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2824 2840 38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38ae37ad96f07d93b71d5e14f7d54f53_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\Fcadea.exeC:\Windows\Fcadea.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD538ae37ad96f07d93b71d5e14f7d54f53
SHA1b68888dbab6dbc9ecc6ca308c70bfd77bf3e31d3
SHA25644eb3271aa56f12aff0461b7e7e797dd352e495d44afb4a3e1cd095ae5c2a95c
SHA512f49939a4ee613893a1837ccad779449a7dae377e889d9c08ade78e3bf97bb47448cc570e5334f05499dee32014b51f55ec63018ef80f7f8d55ddfb92985fce2a
-
Filesize
372B
MD5c69e3161e9cb5de3532588edb00efa26
SHA1c12fe6d1dfdf51f34a771df9a537442303ca9da9
SHA256ca1fc5936171e2cf8a3f74c7aacf9bcbc7869a1423e8c2f595860a17c0c8ea60
SHA512a7133d4efa9bac350285ca86c443c6610416f6101d7629af2d7b439e8cf89c8f8121c2382ca24a6781e9f77f07320c130e806941b6f7ebe784c5460f9fcce7db