Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe
-
Size
412KB
-
MD5
61bc93747f7407920cf517d4ad30936b
-
SHA1
9594c2016025aab1d8f4ea342ef74f209a4a7167
-
SHA256
2087faa7cbbcf4e315d292459f00ef02bca519245243264a07710c81b9822123
-
SHA512
6d420a1058aea98ec7ae2316d95fbeecbe208fc4356ada194dd3502cc76790868ab97f40b3f93ea60d1261b8891471fddb59b7f0febf29be3d50daeab45e32f5
-
SSDEEP
6144:gDf6p0X4qumAxSRLnoPhL20gKc1ilJPZNkCLNr3Kr/u2x58uncuCKWYyYCcFV4ry:7p06UI9gKcaLLSdCKqYCemfxDIz
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\s2er333vice9.ini 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1884 installation.exe -
Loads dropped DLL 4 IoCs
pid Process 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 1884 installation.exe 1884 installation.exe 1884 installation.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\Realplayer\Windows\installation.exe 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 1884 installation.exe 1884 installation.exe 1884 installation.exe 1884 installation.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1884 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1884 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1884 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1884 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1884 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1884 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 30 PID 1948 wrote to memory of 1884 1948 61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61bc93747f7407920cf517d4ad30936b_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\program files\Realplayer\Windows\installation.exe"c:\program files\Realplayer\Windows\installation.exe" "33201"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5109f2cc90d77947cbb4e40dfafc10aae
SHA193a766df3e6b025f497825b0cd1fa11f6be29caa
SHA256a81f85099248ea69b84360b95527af891d75e24a51ad5c07b3ec610f9e0b3c23
SHA51207aa0cfce23d6214a1293ff79c6544bdf4889d41460a4f0b11b2e2771b2c6d59ff7eacf484fab48854f6f850ea8256b2474c2f0484fe466c2575c78f38f8042a