Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe
-
Size
112KB
-
MD5
5e211751c1658d2ea7ccfc9e61b51a9b
-
SHA1
a5c792315b1b272c0ff9019c7c70f011dec83731
-
SHA256
4132af2bd6bf06136f0c8bb69b535989497e7707b9f4ab6830d6bb2d97f831fb
-
SHA512
ab3e19d1e157b4861f9b4fc6a4824bede95f858d64d6cef090cfcde9beca8611f6c12eaefce3d25b60f8989dad207158e7756c73ef130f8302aac5278d22595f
-
SSDEEP
1536:fDVe02vhzJkekd5bwcsjeA9R2y1aUizTULLYviC:h/25zDkd5scGley1aUcYY
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1496 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\NVDispDrv = "C:\\Windows\\NVDispDRV.EXE" 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\NVDispDrv.dll 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\NVDispDRV.EXE 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe File created C:\Windows\NVDispDRV.EXE 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1496 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe 1496 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1244 1496 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe 21 PID 1496 wrote to memory of 1244 1496 5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e211751c1658d2ea7ccfc9e61b51a9b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD516a541325a707bf22849ad1800e45a9a
SHA14efe49e60386004e07a6bd74a21ca3c53eddf2a0
SHA25653e5818743db1c18c7bd63aa69b956b6e35ca35551c018b756fcf1eb55f282f7
SHA512fc79dcd4d096f3579657abfbd58277972241b04f6dc6017d79f390b48005d427ffc40e1a26c1353104226810dcc011667b734242b0446ee65b9037f669a331d4