Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe
-
Size
163KB
-
MD5
3e2fb6a345afa0aaa4dd9e3c7d92fcc7
-
SHA1
4fb908dd9465302c7786bfe153247816608feb04
-
SHA256
cc885c4c9783c709166759e5d0139064a0a79de372d4d28f3ce0e37e15a984d8
-
SHA512
3d7dfd73024816539f265cb6febca9fd512153e51e7bb07f60c8105b79a6607effc1afa6f3053f70b6d4da3b638182ed3a10117c7979a7dbe6104660625b5c76
-
SSDEEP
1536:5bXKXuj4XqPrPXlDHNnzwDX4lOCUYcGeynP58riq7vqLUA94QsjibbZ+6P7SPS3W:5baPOrPhtdPqb7vq/2QbbZ+c2N
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2912 fxstaller.exe 3408 fxstaller.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center = "fxstaller.exe" 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4388 set thread context of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 2912 set thread context of 3408 2912 fxstaller.exe 88 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\fxstaller.exe 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe File opened for modification C:\Windows\fxstaller.exe 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe File opened for modification C:\Windows\fxstaller.exe fxstaller.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 2912 fxstaller.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 4388 wrote to memory of 880 4388 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 85 PID 880 wrote to memory of 2912 880 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 87 PID 880 wrote to memory of 2912 880 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 87 PID 880 wrote to memory of 2912 880 3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe 87 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88 PID 2912 wrote to memory of 3408 2912 fxstaller.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3e2fb6a345afa0aaa4dd9e3c7d92fcc7_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\fxstaller.exe"C:\Windows\fxstaller.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\fxstaller.exeC:\Windows\fxstaller.exe4⤵
- Executes dropped EXE
PID:3408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD53e2fb6a345afa0aaa4dd9e3c7d92fcc7
SHA14fb908dd9465302c7786bfe153247816608feb04
SHA256cc885c4c9783c709166759e5d0139064a0a79de372d4d28f3ce0e37e15a984d8
SHA5123d7dfd73024816539f265cb6febca9fd512153e51e7bb07f60c8105b79a6607effc1afa6f3053f70b6d4da3b638182ed3a10117c7979a7dbe6104660625b5c76