Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 17:15
Behavioral task
behavioral1
Sample
641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe
-
Size
450KB
-
MD5
641088ff4e53e78d20df0da2d391c151
-
SHA1
d254e5d4c89087b2ce1f81b643b4e9f0e15acd96
-
SHA256
957561abe0f4265767360ee5f77f816bb4f85377405cb70f9ea52f9269fd273d
-
SHA512
b66ebd7a3fe75c6d8572fa357a6e6b0f78dbedc7dc0886a365eff47f73490f1915f1bc9c6107d3903d921c5820ad9e8b30837830b63248754817ddb5c48e0021
-
SSDEEP
12288:LAnnvbOZVDCC2x0NlnlazCQaZUEb5DhJzUZa:LSnqG2lM4F1Lg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4968 Krynua.exe -
resource yara_rule behavioral2/memory/3820-0-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/files/0x0009000000023455-11.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe File created C:\Windows\Krynua.exe 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe File opened for modification C:\Windows\Krynua.exe 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Krynua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Krynua.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 133776 4968 WerFault.exe 87 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Microsoft\Internet Explorer\Main Krynua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe 4968 Krynua.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3820 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe 4968 Krynua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3820 wrote to memory of 4968 3820 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe 87 PID 3820 wrote to memory of 4968 3820 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe 87 PID 3820 wrote to memory of 4968 3820 641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\641088ff4e53e78d20df0da2d391c151_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\Krynua.exeC:\Windows\Krynua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 7563⤵
- Program crash
PID:133776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4968 -ip 49681⤵PID:61076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD5641088ff4e53e78d20df0da2d391c151
SHA1d254e5d4c89087b2ce1f81b643b4e9f0e15acd96
SHA256957561abe0f4265767360ee5f77f816bb4f85377405cb70f9ea52f9269fd273d
SHA512b66ebd7a3fe75c6d8572fa357a6e6b0f78dbedc7dc0886a365eff47f73490f1915f1bc9c6107d3903d921c5820ad9e8b30837830b63248754817ddb5c48e0021
-
Filesize
390B
MD56a61a443e2a52f5ae4d6dad6bbf544e8
SHA135274ae1012668532208492a4cc814051f378faa
SHA256951d53d49a193775b5be0adf0ea8cf0b371c499006bebde1da4287db6412ba44
SHA512832c1d084e44c737b70a8de6258f802b1e3744a64f857ecebdd3667d47b550fb2c0e87d4c0203bba4d5897475dbe101763d339594673a19eb2c9a3772cbf21d1