Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe
-
Size
88KB
-
MD5
46636f0a19da3c85db3e08cf6633ae34
-
SHA1
02d5606837b4e578367322a87d1c6c86605b0ef4
-
SHA256
2908c9babcc4031257e4d6a4662b41ea892358834bc2e748fbbb4e4cc6e650eb
-
SHA512
cec82d805eef310098e88211f34631a5f2af92165bf015dce2f28c6721f1db3a22db25af5b3ed7162d9c2dd26a9852358793df0f4789b2f16ff3529c854fbada
-
SSDEEP
1536:IFDGY3DJOdKzGgBA2jRIFMCPdhjtr/FBK6+U0nbVyV+ufe2gj5Xh:IZnz1z1BlTQdZpadU0i+uA3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 dllhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1640 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe 1640 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Repair = "C:\\Windows\\system32\\Repair\\dllhost.exe" dllhost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MrX-world.dat dllhost.exe File created C:\Windows\SysWOW64\Repair\dllhost.exe 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Repair\dllhost.exe 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe File created C:\Windows\SysWOW64\MrX-world.dat 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Repair\dllhost.exe dllhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1640 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe 2388 dllhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2388 1640 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe 30 PID 1640 wrote to memory of 2388 1640 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe 30 PID 1640 wrote to memory of 2388 1640 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe 30 PID 1640 wrote to memory of 2388 1640 46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46636f0a19da3c85db3e08cf6633ae34_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Repair\dllhost.exeC:\Windows\system32\Repair\dllhost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD52e7c53ecfba62fd99bf1333b5602ce0d
SHA16638bfff9970ef8cfd3ed9c26af992d93edbc4c8
SHA256338267c1947903280b2d72e32d8f4287f2056351a463c4cbc9118812796e08b9
SHA512890b1b0cd4bb996eea0557889c7affd868be73b11a206dcada0a89cffcee033f39065bb84f505c5b7704be0d98e851f0cc42304ffe3b5ad1f77e1f842f7ff5ea
-
Filesize
88KB
MD546636f0a19da3c85db3e08cf6633ae34
SHA102d5606837b4e578367322a87d1c6c86605b0ef4
SHA2562908c9babcc4031257e4d6a4662b41ea892358834bc2e748fbbb4e4cc6e650eb
SHA512cec82d805eef310098e88211f34631a5f2af92165bf015dce2f28c6721f1db3a22db25af5b3ed7162d9c2dd26a9852358793df0f4789b2f16ff3529c854fbada