Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 18:31
Behavioral task
behavioral1
Sample
5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe
-
Size
407KB
-
MD5
5d26b7322dd4d8de4e8c2cb4e7f7d2f0
-
SHA1
1afb6fbc101ac1d40be9c59c85af838a6d556c3c
-
SHA256
e472e7a4d672ee5bf125545518f44497b83168249ba2792cc9387700c21f0e4f
-
SHA512
1f6f6fec9605bdbe91400d7426becbfd435ec6c2f6e5cddc2bbf00744c0932b8a864d75862083ab14e9e846c0caf397fb59976d57de1513be77fc75a58cc0bbb
-
SSDEEP
6144:Bxov71WpHywAjKZ9t3lfr6m2MObxyTliR4LhddBLG4F8k:77pHka3lp25X6hddVGQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 636 Mhunua.exe -
resource yara_rule behavioral2/memory/2120-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/files/0x0007000000023441-10.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Mhunua.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe File created C:\Windows\Mhunua.exe 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe File opened for modification C:\Windows\Mhunua.exe 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Mhunua.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 44100 636 WerFault.exe 89 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Software\Microsoft\Internet Explorer\Main Mhunua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe 636 Mhunua.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2120 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe 636 Mhunua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 636 2120 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe 89 PID 2120 wrote to memory of 636 2120 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe 89 PID 2120 wrote to memory of 636 2120 5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d26b7322dd4d8de4e8c2cb4e7f7d2f0_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\Mhunua.exeC:\Windows\Mhunua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 7163⤵
- Program crash
PID:44100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 636 -ip 6361⤵PID:44048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD55d26b7322dd4d8de4e8c2cb4e7f7d2f0
SHA11afb6fbc101ac1d40be9c59c85af838a6d556c3c
SHA256e472e7a4d672ee5bf125545518f44497b83168249ba2792cc9387700c21f0e4f
SHA5121f6f6fec9605bdbe91400d7426becbfd435ec6c2f6e5cddc2bbf00744c0932b8a864d75862083ab14e9e846c0caf397fb59976d57de1513be77fc75a58cc0bbb
-
Filesize
390B
MD5cab0636ca23fda3227bb8ee418fd5ac5
SHA189f2de20d410e8da96fdcb07a1dbae023125dc06
SHA2561b71acb8a75364dbf0ffdc64027d90b0765349f39b800dd891da38afdb847ca1
SHA5123693f722176c1ab372f04d361d533d2cf5243c2ed5d93ba1fa6ea5e445c269cf74abf5f1e7b4ef7cff629513458c69b4f4d00289bd86dc89c73532d6af77969d