Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe
-
Size
125KB
-
MD5
42379e70bb511d7659943faaa3d84e1c
-
SHA1
e885091986a50c70e2d6179c3ecddaca1ac1d425
-
SHA256
15e582c0960adb412c05316336dab08438bf563391e64f636945aa8849251da9
-
SHA512
dc6ab52e3b85f1cd2a0404984b0775a9647dec61e9a37e8ecbcde177f8b0542633e4c9958c077fd98184e82d75163b87be0edc6762d7ee72b82da5ff53a36042
-
SSDEEP
3072:EJgwBIxhn+dz7diTqkGqcZBUPs7dHNnu3lAzyDJkluJfBd8W:EuwWx8fScnUPey1BtB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4128 Fvynua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Fvynua.exe 42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Fvynua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Fvynua.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe File created C:\Windows\Fvynua.exe 42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Internet Explorer\Main Fvynua.exe Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\Microsoft\Internet Explorer\International Fvynua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe 4128 Fvynua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4924 wrote to memory of 4128 4924 42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe 86 PID 4924 wrote to memory of 4128 4924 42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe 86 PID 4924 wrote to memory of 4128 4924 42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\42379e70bb511d7659943faaa3d84e1c_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\Fvynua.exeC:\Windows\Fvynua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD542379e70bb511d7659943faaa3d84e1c
SHA1e885091986a50c70e2d6179c3ecddaca1ac1d425
SHA25615e582c0960adb412c05316336dab08438bf563391e64f636945aa8849251da9
SHA512dc6ab52e3b85f1cd2a0404984b0775a9647dec61e9a37e8ecbcde177f8b0542633e4c9958c077fd98184e82d75163b87be0edc6762d7ee72b82da5ff53a36042
-
Filesize
390B
MD51d16fc38b909b01507649d70e3ed09ba
SHA121b0b7f5a8e3741755968dd38de0407637f03ce1
SHA256d888d76efacf3dfe40496901c4249bfdfb6d198ef30cfaf1f3f5471c24b604ff
SHA5120ca1f7b779d12f40dea5fd27e46a8445f5f02ddf7474da57e89c24088574fc8a5c9d7ad5eaefb0c571f1e2be5c0e7b9ca02c1314e2e1516ee7e69fbe590892d8