Analysis
-
max time kernel
140s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe
-
Size
73KB
-
MD5
393b8621611b5e9ef9e6640fdbea3ab4
-
SHA1
cac963d035181b445b37718187cb7c0dfd4fe6bd
-
SHA256
8b8496785fd976634e1da5445832a6d70a7bf6d4942b5b0a8b6ee4529a1cdb49
-
SHA512
86417617917b0fc79458cff213fd6a7e05de58eb38055ad2caf3bf70a25935fb0cbe04e70d645296435281179d328d08cb339239e9e0af2050f283b3d32186b1
-
SSDEEP
1536:B45NKceomsWEd8xK/i9GUGJdvAh3yt+kDhCgJxYr8SNZZ2AFcZA:BiK1oh2KAGUsGh0EgjtSNyZA
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\B831406A9770.dll 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe File opened for modification C:\Windows\Debug\B831406A9770.dll 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117} 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\ = "fsvdf" 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32\ = "C:\\Windows\\Debug\\B831406A9770.dll" 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32\ThrEaDiNgModEL = "aPaRTmEnT" 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1796 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 30 PID 1668 wrote to memory of 1796 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 30 PID 1668 wrote to memory of 1796 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 30 PID 1668 wrote to memory of 1796 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2832 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 32 PID 1668 wrote to memory of 2832 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 32 PID 1668 wrote to memory of 2832 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 32 PID 1668 wrote to memory of 2832 1668 393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\393b8621611b5e9ef9e6640fdbea3ab4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD5e2c90b4108d6899c176945db5880fda3
SHA172df532c23b24cb1e7a788247bb55f5cd25a7dc4
SHA256ce61660e78fd68ec71bd2340e790a43806bac1050d177dadf885c5e73971c34a
SHA512d237ba29529e695165606cc0b3e5b36620697ad0c57ce6202748a36868c1e8583ba1f4d61698d5fccc02a151795c1c19c18be33bcef26abcd4ec8fde570c1f43
-
Filesize
53B
MD5a4d96053046664ff91d68bc81a14648a
SHA1ab84671f8ffbcfa80e577447a50af7616252eaef
SHA2566105f59d1897f2ce11f0faf2f6f81ceb5e0bec3493a8243a23148351d6d616bf
SHA5129cc4789c71260ae7c9eb047230ad30d0dd97185c201343c7f3eb4308c1504b937d7e2113c2f4a5ba9d5703693d2edf165346a2cbd1c28a79089578fb25ec7e3f
-
Filesize
154KB
MD56c37196f71a8b65864ab335efb6079f1
SHA1cad00f9dcc3a460255f9a16303494d14da8d7ad4
SHA2566f829dd99c15bf1abbcda0eed1113994f92143fb64fd0c7daa36d84594825887
SHA51285cb36f05edf4af26404ed01e43adc0890f53f1eb23d277b8b6811d987cbb00e433916a81360435c1a7caecbcca6e518f05b1274e5a7936b938614114a1ba6fe