Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 08:38
Behavioral task
behavioral1
Sample
5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe
-
Size
20KB
-
MD5
5fc9037b9d1f2ff2ff639b2765b08572
-
SHA1
c0bf81d21740d91d4194fef397e4ce1f59743e96
-
SHA256
fdb2e87ee8e3f7249b707d8f3bd8c6ed2ac21a7a60b902500a08bc2cdafac09c
-
SHA512
9b539b23e8f6c4244f7d90b0cdca7cc7743da4297bb8ce2d0eb9c77f175d2156c3c9d4498564a54e2b2d33bb23bcfe0d74196ba587166022720699b1fc6efddb
-
SSDEEP
384:E/IShgKSdsjYTKYn1dsJ8KMQPvc8pXFDuGfQFj6R2ClzoW6FW21:E/ISunds8eMEwQPk8iGfQFj6wwe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4648 csrss.exe 4424 csrss.exe -
resource yara_rule behavioral2/memory/648-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000700000002344a-8.dat upx behavioral2/memory/4424-20-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4648-22-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/648-23-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\com\csrss.exe 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\com\csrss.exe 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\common files\system\ntserv.exe 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe File opened for modification \??\c:\program files\common files\system\ntserv.exe 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 4648 csrss.exe 4648 csrss.exe 4648 csrss.exe 4648 csrss.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 4648 csrss.exe 4424 csrss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 648 wrote to memory of 4648 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 84 PID 648 wrote to memory of 4648 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 84 PID 648 wrote to memory of 4648 648 5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe 84 PID 4648 wrote to memory of 4424 4648 csrss.exe 85 PID 4648 wrote to memory of 4424 4648 csrss.exe 85 PID 4648 wrote to memory of 4424 4648 csrss.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5fc9037b9d1f2ff2ff639b2765b08572_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
\??\c:\windows\SysWOW64\com\csrss.exec:\windows\system32\com\csrss.exe c:\users\admin\appdata\local\temp\5fc9037b9d1f2ff2ff639b2765b08572_jaffacakes118.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
\??\c:\windows\SysWOW64\com\csrss.exec:\windows\system32\com\csrss.exe c:\windows\syswow64\com\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4424
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD55fc9037b9d1f2ff2ff639b2765b08572
SHA1c0bf81d21740d91d4194fef397e4ce1f59743e96
SHA256fdb2e87ee8e3f7249b707d8f3bd8c6ed2ac21a7a60b902500a08bc2cdafac09c
SHA5129b539b23e8f6c4244f7d90b0cdca7cc7743da4297bb8ce2d0eb9c77f175d2156c3c9d4498564a54e2b2d33bb23bcfe0d74196ba587166022720699b1fc6efddb