Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe
-
Size
186KB
-
MD5
3d31d688173a6770f66fdf2b85190c4b
-
SHA1
3416f7a7ea9c6119d6a019eb474fad04a90bf20c
-
SHA256
9c5d9300063989a2c5ef1dbf9bab9d635ea5e6f3ee4df633ec87631031102d29
-
SHA512
29fba9256efd7f94441e9d1c80c662da52591528bfce2622ed5f7a5558ef2174886447e18c77e2b5faa3ee254df3ad1f8a3515145a06107ae4378f63dd8cd1c2
-
SSDEEP
3072:MCKQDBaXBsnaQLDvkAzP6tQPkfKEryU4yAx/dtCHK6ZcQIa+:DVQRsn1LDNkQsfdy7yK/dAq0hj+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1456 Asotia.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe File created C:\Windows\Asotia.exe 3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe File opened for modification C:\Windows\Asotia.exe 3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Asotia.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Asotia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main Asotia.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\International Asotia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe 1456 Asotia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4328 wrote to memory of 1456 4328 3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe 86 PID 4328 wrote to memory of 1456 4328 3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe 86 PID 4328 wrote to memory of 1456 4328 3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d31d688173a6770f66fdf2b85190c4b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\Asotia.exeC:\Windows\Asotia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD53d31d688173a6770f66fdf2b85190c4b
SHA13416f7a7ea9c6119d6a019eb474fad04a90bf20c
SHA2569c5d9300063989a2c5ef1dbf9bab9d635ea5e6f3ee4df633ec87631031102d29
SHA51229fba9256efd7f94441e9d1c80c662da52591528bfce2622ed5f7a5558ef2174886447e18c77e2b5faa3ee254df3ad1f8a3515145a06107ae4378f63dd8cd1c2
-
Filesize
390B
MD594cbe13157b1d5faff794ce30b6bf9d7
SHA1c5eed0b13276cab76e5f0ad0c0df4048d85ad5d4
SHA2561afe8ac8890aab535638dd93ac7c7d8fb903514d01f01ba00539b7f32e15ef51
SHA51295bb852ec1c3ec786b01295487d1a76725482e71bc4ae493c2a61cad10d81b74f4753711799b7b9966c810ef20a94e2c8ba37367fe1fbce485f782d35ccd7e01