Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 19:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe
Resource
win7-20240708-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe
-
Size
344KB
-
MD5
3a6faefc20c7756840d3e317286c048d
-
SHA1
685fe5180111bd937c8bde85ff431df81129b817
-
SHA256
8826a97421fff969ed33153db7e3a93391fc356e13e4c3e913562eb78c897fb3
-
SHA512
841fa6ecdf88867ab6302a6bdef60a936b975478f26c22d679a5161e8b06463760e2317aef471192be6d175942d27e0794ffd741b80758333f089fdded2a4a89
-
SSDEEP
6144:9/uDWm4tBQBmTpw/7EqJoF+wInVW5GJZ2tNYLj8Mfs2e9wGkf1GXC:9nntBQBmz8/hVzYKj86s25GW
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1728 set thread context of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 set thread context of 0 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 wrote to memory of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 wrote to memory of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 wrote to memory of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 wrote to memory of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 wrote to memory of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 wrote to memory of 4520 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 83 PID 1728 wrote to memory of 0 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe PID 1728 wrote to memory of 0 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe PID 1728 wrote to memory of 0 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe PID 1728 wrote to memory of 0 1728 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe PID 4520 wrote to memory of 3420 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 56 PID 4520 wrote to memory of 3420 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 56 PID 4520 wrote to memory of 3420 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 56 PID 4520 wrote to memory of 3420 4520 3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a6faefc20c7756840d3e317286c048d_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4520
-
-