Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe
-
Size
85KB
-
MD5
62c97308bbff008384fe910e0358f33d
-
SHA1
7ad3fde0ba12e1f02dadec817973c53b12d29710
-
SHA256
5c7f9372fea7c0baa8e73382a708206ef0037c27532a39b8d3a319b06e682501
-
SHA512
c7383e8400f2ba9be618c58ac0bef3daa578033de2d2b1b7846d5fb6d352c408cd271970a7211fffb46f8209174f1be75496e98e30229d50de9900d9fcbeeebd
-
SSDEEP
768:JgO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD7aXKynF0vQcYZUcc:eshfSWHHNvoLqNwDDGw2eQcLb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe File created C:\Windows\SysWOW64\¢«.exe 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\rundll32.exe 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe File opened for modification C:\Windows\system\rundll32.exe 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1721642665" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1721642665" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 2808 rundll32.exe 2808 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2808 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2808 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2808 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2808 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2808 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2808 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 30 PID 1684 wrote to memory of 2808 1684 62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62c97308bbff008384fe910e0358f33d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5c2a416cc03578843fcb4b0ecec54637f
SHA144a056ba92e7eb97b768b7cda7d35be331dc7345
SHA256d0993ee9dbfc27bdea460f1060655b6fc4aca7df834c067f7d80d6eaf5ef82c8
SHA51230238c9f6a7670d94dd919f44dc755b66a7cb40994c98c940a1dd3e539f7e618a40f725171932eadeafd6a55b7665acd44bd5525341529b67a75f34df60776f5
-
Filesize
87KB
MD54c82b36ca833ceeae3783d49d9f2f220
SHA1a03709d9ea91911c399426ed324d2e53523cb87c
SHA256ee0b9e464d68bf6e9e3eb6738c455ce02d29cdf3293d147ae814b28b58d825c6
SHA5128adbae5da48eada489e6e2d90390b9ee70d3123c945e448550268a7e197be378004bd6e7dee9dac7988e82a77bee01d62745afcce9a03a3c0f4405f0ef694613