Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe
-
Size
13.9MB
-
MD5
3fdb952bf83b7e8caf5e8342e65fcdad
-
SHA1
ff39bc7215fc60ffd1bab484f079eba19bc430ce
-
SHA256
5dcbd9390fdecc784283fafce4c2f1a5f396d314630bfc8849477e0dd569db89
-
SHA512
f4939f7ebade4ad8c9982dbf954a90d5edac007c7425c1b0e4d79f223175183c38878356f6d3483526cd2c766a8e1120448403ed9f9858244ec6306cd198f23e
-
SSDEEP
393216:wFGoQXZZXWZS/P41coHUPL/GwkNWtQ/J41W8PW:Vo+bXWZS/PAckUzuWm4PPW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1376 tkD92B.tmp -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1376 set thread context of 3656 1376 tkD92B.tmp 88 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\IspiHostAdmin.exe = "11000" 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1376 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 86 PID 3040 wrote to memory of 1376 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 86 PID 3040 wrote to memory of 1376 3040 3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe 86 PID 1376 wrote to memory of 3656 1376 tkD92B.tmp 88 PID 1376 wrote to memory of 3656 1376 tkD92B.tmp 88 PID 1376 wrote to memory of 3656 1376 tkD92B.tmp 88 PID 1376 wrote to memory of 3656 1376 tkD92B.tmp 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3fdb952bf83b7e8caf5e8342e65fcdad_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\tkD92B.tmpC:\Users\Admin\AppData\Local\Temp\tkD92B.tmp /p:3040 /t:30002⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5492892e94423c01fa24b56122493f931
SHA1090ed869a7f5965709e5acd74215eccc297f3ecf
SHA256191d2dbadf13e649f30b8996615bf4fba9c8f687ec832c2e881369e2e4b581df
SHA5129eeb0176426e0b05f6861e7e0acb6a22b783925c610207ff0d12eb654c36e8c3265bebb5f555f8c41490bbd28d92b12dc8df6e4d3c5d83f866af09bcdf652421