Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe
-
Size
42KB
-
MD5
45a70e8d5279268a54a9296b41b81e77
-
SHA1
ea1c5d774ec9ac20a2e60f6e1aa99c8fa5e0910b
-
SHA256
c15bc05bc42f1aad6d01e04853f5033900564c8059aa9750656bf27d95b65f8c
-
SHA512
145e5f29bd99ed7f9e9815159aad23c1a80d724011a31da9885f6ed4a4e2fcb2c1e64349f675c57b9a35c6ef539535034a61d32ebdd4f0d09675b73b1cdcd64b
-
SSDEEP
768:36Esy4oMuVJ9UFAp5v32pk9M7dZOJZBCN2T328Ro9H/auPl6eQPF0WABn:psH8OFA7K7dya2G4o9RP6PFbg
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3520 set thread context of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\i11Heb.com 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\i11Heb.com 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000_Classes\Local Settings 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4488 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 4488 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86 PID 3520 wrote to memory of 4488 3520 45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45a70e8d5279268a54a9296b41b81e77_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:996