Analysis
-
max time kernel
143s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe
-
Size
41KB
-
MD5
450c09e7b8d073d9f04b643ce356959d
-
SHA1
1936454fde60b7b23cc77dc5208690de7ab633a0
-
SHA256
b307dce885eb84ba210b9085319ace92f072e0ab456a9fc9005bcb00eef9f353
-
SHA512
2cd64870c87b40a0183b2d43d45f3fa11d96cbabd09b5713280e1ae7b15d174e9802777225dc99b6ff5c18fb7b9d8947d5493860f2484374ffa61a6cd5c298fa
-
SSDEEP
768:it5DUOnO9RS5qtYngI8te10VkQODxBTP5tSbWvgtAxmha5:UoOkVtYnHSe6hODxBSyg3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\conme.exe asds" 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000900000002346b-2.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1480 conme.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\conme.exe 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4388 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe 4388 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe 4388 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe 4388 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1480 4388 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe 86 PID 4388 wrote to memory of 1480 4388 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe 86 PID 4388 wrote to memory of 1480 4388 450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\450c09e7b8d073d9f04b643ce356959d_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\conme.exeC:\Windows\conme.exe2⤵
- Executes dropped EXE
PID:1480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD56b9f2f0cce3aa7674d77752a1286a237
SHA1daa441e2876881d9b51a5eada38150c982d33d8c
SHA256d72378fd3bb485a5c195de7eedad98705faee6a6b713ef23ae4ef03a05ddd914
SHA5128a439d1f134f97c0370ffc6a3f152edeff5c307c0ba5828826b456a922c36125bd7737872fb991540a92fa0444a48d5dfab801a9b4ef026a3052fdc6f15f7cb6