Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe
-
Size
73KB
-
MD5
43c2dbec6156cc206a977746d76b3b62
-
SHA1
35f8fcc272c1d14be7be4937fbad50340c693fc6
-
SHA256
7f6dec80dccde954b8ecd6e6ace985bdda73086b9edcbf5a32a4de9fe35fa1f9
-
SHA512
330ca3baf3c0e7e7795406c80aaa7f0df8a493ea9a083389c07fb6828ddb322017b546e272be2ecb1f6c60d1608ece47962df08b6f25e135791d09431b082943
-
SSDEEP
1536:5kb2IcfkBP+YZIDh8T9BUItmXDlNvrkCDWQVkE28uzkPLhSM++h:0GkBPfZVT9BUqmXpdnKQVkXPzwLl+0
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Debug\B831406A9770.dll 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe File created C:\Windows\Debug\B831406A9770.dll 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117} 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\ = "fsvdf" 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32\ = "C:\\Windows\\Debug\\B831406A9770.dll" 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{291FABA8-CB00-488C-AC9E-B457FFC4A117}\InProcServer32\ThrEaDiNgModEL = "aPaRTmEnT" 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3040 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 30 PID 2860 wrote to memory of 3040 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 30 PID 2860 wrote to memory of 3040 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 30 PID 2860 wrote to memory of 3040 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2064 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 33 PID 2860 wrote to memory of 2064 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 33 PID 2860 wrote to memory of 2064 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 33 PID 2860 wrote to memory of 2064 2860 43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43c2dbec6156cc206a977746d76b3b62_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:3040
-
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵PID:2064
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD56a857f3a8a3ed4e9a4e36136bd54622b
SHA1f8954637d31a74ec8779cd9582611d3b08d032dc
SHA25643f1441f6e77f1bf03a9dda2fe17edbb30a33c35ba6175f9711a3ccf478386af
SHA512df1cf830d4f5025b9c4c5c88bd51e644948d4cb697add2112bbfa4ef32a9f9a810716759e9102714e5e3065e72d2b23a986734172e7da5dc9b446c89b14a1583
-
Filesize
53B
MD55f312aefe66000f08e943419c4cd9b7c
SHA1c54cdc424e826ce373f678775ab933178d6d38a5
SHA25663629a9885273d996dec504ee82a91118e241362b0c546bcbee5847ca6ca33ad
SHA51289cc6f34b932a59a0d160f1442098f8e1d97b6ece5c2739f0c9d370fb6344f5972f227baf63fc71e2669c30438dc3b982e95d78f4236a622e7f9bafea5189d19
-
Filesize
154KB
MD577193e1f14ab53a4d98774cace16b807
SHA1ae4974beb8a29e085ef756fa7d9daa6aecdd210a
SHA2569823b5f47813c476d382a3a12b7840db37466c4974c9e6bad211d727957b920e
SHA512398200fc148f99ad26ef18404ad73caa5f0a9f1b9b31521a53aa66da8562c090835446ef3c7d428a734e5f43be19383db0f9a57173207e9e33fe0391deb51403