Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 07:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe
Resource
win7-20240704-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
6 signatures
150 seconds
General
-
Target
624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe
-
Size
104KB
-
MD5
624d7d7bb849f1f92d03f263e859546c
-
SHA1
b694400711660815b8b015d92825d3470e477389
-
SHA256
b2533543ca278bedc3a759b777fb4d86fd573302a6c8994449329f6493da2d91
-
SHA512
7df2522a320bb2e1cff3cab60551cdaece32ba6a7aee2c1dadf0f06cf008ab085085c49ad8cfe1ea4316bcddc40a31f6c7522749a7cc4caa84852d9cd3798147
-
SSDEEP
1536:wUKdXOnI96LuTGy0pj0x1yZyfmyiiaks5AQedxQ1/zzqB7Bbrxy3hrm/LoZW1:+OI96yTn0pxMf2ksJX/HQ7BfYxrm/Low
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4268-0-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/4268-2-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/4268-1-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/4268-6-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/4268-8-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/4268-7-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/4268-9-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-58-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-65-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-64-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/4268-69-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-63-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-62-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-61-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-60-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-59-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-57-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-56-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-55-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-53-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-51-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-50-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-49-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-48-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-47-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-46-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-45-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-44-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-41-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-40-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-39-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-38-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-37-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-36-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-35-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-34-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-33-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-32-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-31-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-29-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-28-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-27-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-25-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-21-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-24-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-23-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-22-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-19-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-18-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-17-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-16-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-15-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-14-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-13-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-12-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-54-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-52-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-43-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-42-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-26-0x0000000013150000-0x0000000013188000-memory.dmp upx behavioral2/memory/3408-20-0x0000000013150000-0x0000000013188000-memory.dmp upx -
Modifies WinLogon 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\StartShell = "Run" 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\Impersonate = "1" 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\DLLName = "crypts.dll" 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt\Asynchronous = "1" 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\crypts.dll 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4444 set thread context of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4444 wrote to memory of 4268 4444 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 84 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56 PID 4268 wrote to memory of 3408 4268 624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\624d7d7bb849f1f92d03f263e859546c_JaffaCakes118.exe"3⤵
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268
-
-