Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe
-
Size
245KB
-
MD5
5cd6d0bcc28e8c6dd3d85aa999d1a391
-
SHA1
802d5cf89003075f62484019cdca5172b91bd734
-
SHA256
293dbe2d7a437dba10e94cfa78ff6034574c8c9f1ccf5e36b96a8b607f7e0f0f
-
SHA512
469a69f21bd9b755febdb0373b8cac362ff28852a73bb53ca03d44b032aaa7873f8e2d4aa82cb9b442edf42ab53e6d31858cb058c63b311f6f8f9fcc9b7818d0
-
SSDEEP
6144:ASkY+33wrGup4VKp7FYkXhe22NJD2BbDQVR:AzY+33wrGuIKRFYS1uDIbDQV
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" 0495ur3bnE..exe -
resource yara_rule behavioral1/memory/2808-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2808-1-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2808-3-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2808-4-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2808-6-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-7-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-13-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-25-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-26-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-27-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-28-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-29-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-30-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-32-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-34-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-35-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-36-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-37-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-38-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral1/memory/2596-39-0x0000000000400000-0x0000000000492000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\0495ur3bnE 0495ur3bnE..exe File opened for modification C:\PROGRA~3\0495ur3bnE 0495ur3bnE..exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0495ur3bnE..exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0495ur3bnE..exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Use FormSuggest = "Yes" 0495ur3bnE..exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Download 0495ur3bnE..exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 0495ur3bnE..exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 0495ur3bnE..exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2596 0495ur3bnE..exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2596 0495ur3bnE..exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2808 5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe 2596 0495ur3bnE..exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2596 2808 5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2596 2808 5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2596 2808 5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2596 2808 5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5cd6d0bcc28e8c6dd3d85aa999d1a391_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\PROGRA~3\0495ur3bnE..exeC:\PROGRA~3\0495ur3bnE..exe2⤵
- Manipulates Digital Signatures
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2596
-