Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe
-
Size
100KB
-
MD5
49e1f5c2497fee2e0d33cb2d74950399
-
SHA1
67f91b9dac8869ec5f0049645cd0b745763fd6ec
-
SHA256
152168804ce4bbc28d6d00dce695d12ffe28826b58fab76e50922f442ec5a99d
-
SHA512
dca080834fdabffdbef8be8b8e1fea486f3355da81fdbbee1d01088168c823ed98a86da6f11e2fcb158b2491aad14118fd99d684641f5676703b7ea72a15635a
-
SSDEEP
3072:xVyHLpxndyyt0g0n8WVLVsfMIYsPfkjO:EL7dfudn8WVLVsU4PMj
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 2776 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Desktop\General 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2592 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2592 1980 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 30 PID 1980 wrote to memory of 2592 1980 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 30 PID 1980 wrote to memory of 2592 1980 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 30 PID 1980 wrote to memory of 2592 1980 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2776 2592 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 31 PID 2592 wrote to memory of 2776 2592 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 31 PID 2592 wrote to memory of 2776 2592 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 31 PID 2592 wrote to memory of 2776 2592 49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49e1f5c2497fee2e0d33cb2d74950399_JaffaCakes118.exe" del2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.exe/c del C:\Users\Admin\AppData\Local\Temp\49E1F5~1.EXE.tmp >> NUL3⤵
- Deletes itself
PID:2776
-
-