Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe
-
Size
56KB
-
MD5
48496997af0bd62cf6167738e32d5fb9
-
SHA1
b3f44b4175f955e68c434e023746badf43e34f9d
-
SHA256
b139a58689248ad7ff7dc5d235125c58219d4473942cd70a7538feb4fa47f5ac
-
SHA512
b9861888ed0dc9f63f8480da13e8406223d406c9d31a03a61464c7616dd364fbcb7d7c3081e81feba66a8cc2e88d1b72829a39649e7b2626f31933a82ab021c5
-
SSDEEP
768:3nH5P/kv6gJ9ECY5f0mq/6/Q/9NF0+LEc8af3ts0E9t:3hkb0Coq2oS+Ljb3ts0E9t
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mwrioy.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 mwrioy.exe -
Loads dropped DLL 2 IoCs
pid Process 2440 48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe 2440 48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\mwrioy = "C:\\Users\\Admin\\mwrioy.exe" mwrioy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe 2368 mwrioy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe 2368 mwrioy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2368 2440 48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2368 2440 48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2368 2440 48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2368 2440 48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29 PID 2368 wrote to memory of 2440 2368 mwrioy.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48496997af0bd62cf6167738e32d5fb9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\mwrioy.exe"C:\Users\Admin\mwrioy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD559d10535e10d479c49830ec0f2b5047f
SHA16de7ded41195027bfc1667a8a09ec4f78b82ae1d
SHA256c68cdea5337ef733c58c10c578c62b91a6f27de40c40164dcf08ae0ef93ace8d
SHA512a793a88959791f7eb615ddd5b6de7ad9ab8301231c6770213ae8bde937518fdf417d372b59a8507867a0c6f9273eb7c617fecb34c0b214115d0087adac80df48