Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe
-
Size
148KB
-
MD5
40d556f6bb899dc01bf7e41456a8abeb
-
SHA1
d89df92e95f4654158e3f7740002dd94b927aab2
-
SHA256
44cb868a51ebc6614f8ad130f475dd3d264049de717e5661cb7fd3b78a43fe70
-
SHA512
d04d67a74542f924b5bcf0e149e1b99b3b9ef78685872da7e9492c5452fe22c43081aa352bb110ce7da17d18cecf6a031660d07ed240bfe9b040f34788d3f738
-
SSDEEP
3072:z75Nxb4T3btf36HV4J6rmUzz/fL8L0syntarRj:x+Y4J2fr8L0sutw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2064 lsaas.exe 2716 lsaas.exe -
Loads dropped DLL 3 IoCs
pid Process 2088 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 2088 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 2064 lsaas.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsaas.exe" 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsaas.exe" 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2360 set thread context of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2064 set thread context of 2716 2064 lsaas.exe 33 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 2064 lsaas.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2088 2360 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2064 2088 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 32 PID 2088 wrote to memory of 2064 2088 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 32 PID 2088 wrote to memory of 2064 2088 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 32 PID 2088 wrote to memory of 2064 2088 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 32 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33 PID 2064 wrote to memory of 2716 2064 lsaas.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\lsaas.exe"C:\Users\Admin\AppData\Local\Temp\lsaas.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\lsaas.exe"C:\Users\Admin\AppData\Local\Temp\lsaas.exe"4⤵
- Executes dropped EXE
PID:2716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD540d556f6bb899dc01bf7e41456a8abeb
SHA1d89df92e95f4654158e3f7740002dd94b927aab2
SHA25644cb868a51ebc6614f8ad130f475dd3d264049de717e5661cb7fd3b78a43fe70
SHA512d04d67a74542f924b5bcf0e149e1b99b3b9ef78685872da7e9492c5452fe22c43081aa352bb110ce7da17d18cecf6a031660d07ed240bfe9b040f34788d3f738