Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe
-
Size
148KB
-
MD5
65f881fdf4a2882ed0438defcacff6b7
-
SHA1
1d68227701963bd462c59bd68f710ad88bcd45f9
-
SHA256
ed11b132a81db29a8e6eb1d3f68014303a3517440ade8648e04ca1d7bca38364
-
SHA512
4668468c22343f73016448d1f82676647ba72e867aa9667f23edf8ffe5c1b524cd2e2e469a7f8e9230630b6386c76becaaad2f8bc38761c9d477a72961953520
-
SSDEEP
1536:2IdcFLZp0dsrYgdRAgH0/m38wIJVOy2JDVhCK8PTSuB:2IdcFLEdskgrt05bnwhVh6PTP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1264 idemoodp0cetka.exe 2788 idemoodp0cetka.exe -
Loads dropped DLL 3 IoCs
pid Process 2292 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 2292 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 1264 idemoodp0cetka.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1668 set thread context of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1264 set thread context of 2788 1264 idemoodp0cetka.exe 32 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 1264 idemoodp0cetka.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 1668 wrote to memory of 2292 1668 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1264 2292 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 31 PID 2292 wrote to memory of 1264 2292 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 31 PID 2292 wrote to memory of 1264 2292 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 31 PID 2292 wrote to memory of 1264 2292 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 31 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32 PID 1264 wrote to memory of 2788 1264 idemoodp0cetka.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
PID:2788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD565f881fdf4a2882ed0438defcacff6b7
SHA11d68227701963bd462c59bd68f710ad88bcd45f9
SHA256ed11b132a81db29a8e6eb1d3f68014303a3517440ade8648e04ca1d7bca38364
SHA5124668468c22343f73016448d1f82676647ba72e867aa9667f23edf8ffe5c1b524cd2e2e469a7f8e9230630b6386c76becaaad2f8bc38761c9d477a72961953520