Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe
-
Size
260KB
-
MD5
5e02ca5f957adb460f8b7e16e74444ec
-
SHA1
c5cf20c8a1cbf63df031b31e4f7aef200737fc36
-
SHA256
b75c649922b3bdf60fb93622dcdaad29c7cf7932d7cc4a044b75a1eef525bf1c
-
SHA512
1e0b739fd0a8cec64c889694ba99d6d7bbec299198e901c27460b9497bb1c3981e0a8d20ebac62a7cd9f90bb95390b4a94262f5cfa776ba50adae1471c821b05
-
SSDEEP
6144:5EBvZ4Y4hAsXBtsHTrYrq6WQnHtdez5/K:5EBvuY4hN8z5C
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spy-Net = "C:\\Windows\\modres\\setrul.exe" 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spy-Net = "C:\\Windows\\modres\\setrul.exe" 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{T5TBB77L-4678-0MKC-421Q-14416031DYU6}\StubPath = "C:\\Windows\\modres\\setrul.exe Restart" 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{T5TBB77L-4678-0MKC-421Q-14416031DYU6} 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3008-11-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3008-14-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3008-13-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3008-9-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3008-6-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3008-4-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3008-12-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/3008-15-0x0000000010410000-0x0000000010446000-memory.dmp upx behavioral1/memory/3008-19-0x0000000010450000-0x0000000010486000-memory.dmp upx behavioral1/memory/3008-243-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Spy-Net = "C:\\Windows\\modres\\setrul.exe" 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\Spy-Net = "C:\\Windows\\modres\\setrul.exe" 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\modres\setrul.exe 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe File created C:\Windows\modres\logs.dat 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe File opened for modification C:\Windows\modres\logs.dat 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe File created C:\Windows\modres\setrul.exe 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Token: SeDebugPrivilege 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Token: SeDebugPrivilege 2092 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe Token: SeDebugPrivilege 2092 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 1940 wrote to memory of 3008 1940 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2940 3008 5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5e02ca5f957adb460f8b7e16e74444ec_JaffaCakes118.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-