Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 18:40
Behavioral task
behavioral1
Sample
6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe
-
Size
140KB
-
MD5
6456a081e50cc4be7c018e4ec6db519b
-
SHA1
c492b0e7cb19da9869d88ed77724217abb37b035
-
SHA256
d37ec82c3bbc9954adf646dca3e5b1874b7872232408fb5e6cc66d3da6ca3047
-
SHA512
f44874f27e2443c9086f5e38bbdfcc3422ec97ed4c3683faf0058b688a4e751dda3d5d8ba00add1487eb7dce0bff249847c1a3f9e25ace76df7340aad2875fbd
-
SSDEEP
3072:dyRvQ8nQ0d2CRi9LkQ7Bli1BvY5CAFmhDEd5IQ:gjnQ0d9Q7QDEd5D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2240 Rvikya.exe -
resource yara_rule behavioral1/memory/2676-0-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0007000000014b33-11.dat upx behavioral1/memory/2240-13-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rvikya.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe File created C:\Windows\Rvikya.exe 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe File opened for modification C:\Windows\Rvikya.exe 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Rvikya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main Rvikya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe 2240 Rvikya.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2676 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe 2240 Rvikya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2240 2676 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe 28 PID 2676 wrote to memory of 2240 2676 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe 28 PID 2676 wrote to memory of 2240 2676 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe 28 PID 2676 wrote to memory of 2240 2676 6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6456a081e50cc4be7c018e4ec6db519b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\Rvikya.exeC:\Windows\Rvikya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD56456a081e50cc4be7c018e4ec6db519b
SHA1c492b0e7cb19da9869d88ed77724217abb37b035
SHA256d37ec82c3bbc9954adf646dca3e5b1874b7872232408fb5e6cc66d3da6ca3047
SHA512f44874f27e2443c9086f5e38bbdfcc3422ec97ed4c3683faf0058b688a4e751dda3d5d8ba00add1487eb7dce0bff249847c1a3f9e25ace76df7340aad2875fbd
-
Filesize
372B
MD5149f779cfcd9abafc6d0c03530736008
SHA14c8d417213498366e9dac120206c30db88310147
SHA2563f578e9d92e58c77993d1aa3d01023ade9d7ab15b41cfb2c3a102b2363d0e4f7
SHA512960f89fe04fbf5f5e9566e38566410cb5172a98fb4befbf975b5871f71c27af3e1e6ccc8e49f0dece6f49386fc9adebdbd9ff4a678f2b0c6ede4a184422a5bee