Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 11:43
Behavioral task
behavioral1
Sample
3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe
-
Size
212KB
-
MD5
3d3c85ddb47ef3f5bd61aeef4f81bb68
-
SHA1
64e509244693ccad36dd3d7dedf0c15b73594cfe
-
SHA256
c276733bdb0a26f674c01b21d0254d7ea906516595d0577deb3bec02e1ab6c02
-
SHA512
cd467b11b13246024ffde048586b2ffa247ebe70c331eaa02887c054208c17c3f68a7743faa069ef550559b1e7bdc4ce0d28c698f4a5003bee3ab9beb2b7e8d2
-
SSDEEP
6144:B+LpzeANQVBXTBPgLKJDSTQL8jPY1SnKhrn3u4pu:B+LPNQVBFPgLKJDl2Y1SnKI4p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 380 Qsadaa.exe -
resource yara_rule behavioral2/memory/4548-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/files/0x000d000000023387-11.dat upx behavioral2/memory/380-14-0x0000000000400000-0x000000000047E000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qsadaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qsadaa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe File created C:\Windows\Qsadaa.exe 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe File opened for modification C:\Windows\Qsadaa.exe 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 78460 380 WerFault.exe 87 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Internet Explorer\Main Qsadaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe 380 Qsadaa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4548 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe 380 Qsadaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 380 4548 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe 87 PID 4548 wrote to memory of 380 4548 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe 87 PID 4548 wrote to memory of 380 4548 3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d3c85ddb47ef3f5bd61aeef4f81bb68_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\Qsadaa.exeC:\Windows\Qsadaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 8363⤵
- Program crash
PID:78460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 380 -ip 3801⤵PID:78440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD53d3c85ddb47ef3f5bd61aeef4f81bb68
SHA164e509244693ccad36dd3d7dedf0c15b73594cfe
SHA256c276733bdb0a26f674c01b21d0254d7ea906516595d0577deb3bec02e1ab6c02
SHA512cd467b11b13246024ffde048586b2ffa247ebe70c331eaa02887c054208c17c3f68a7743faa069ef550559b1e7bdc4ce0d28c698f4a5003bee3ab9beb2b7e8d2
-
Filesize
390B
MD559f473f8f3c9583ae3257ec68019e699
SHA109a29f27205a581c5c3dcce9fc64c8ae7ccc72b4
SHA2565aefe5e9e0fee43948bdb91426501e0da3df155ddef0418dc2c89caba5e4d12b
SHA51272551882ef3b8af6fb5ec4e5dab46b6bc22b110006b2b85712a86eab816ac8eb8d29454bf797377ef5c8b6f4524d6f7f636883e1a4accfb027765fe6e255f99f