Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe
-
Size
148KB
-
MD5
65f881fdf4a2882ed0438defcacff6b7
-
SHA1
1d68227701963bd462c59bd68f710ad88bcd45f9
-
SHA256
ed11b132a81db29a8e6eb1d3f68014303a3517440ade8648e04ca1d7bca38364
-
SHA512
4668468c22343f73016448d1f82676647ba72e867aa9667f23edf8ffe5c1b524cd2e2e469a7f8e9230630b6386c76becaaad2f8bc38761c9d477a72961953520
-
SSDEEP
1536:2IdcFLZp0dsrYgdRAgH0/m38wIJVOy2JDVhCK8PTSuB:2IdcFLEdskgrt05bnwhVh6PTP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3144 idemoodp0cetka.exe 4088 idemoodp0cetka.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MS Service Manager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\idemoodp0cetka.exe" 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2456 set thread context of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 3144 set thread context of 4088 3144 idemoodp0cetka.exe 91 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 3144 idemoodp0cetka.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 2456 wrote to memory of 544 2456 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 85 PID 544 wrote to memory of 3144 544 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 88 PID 544 wrote to memory of 3144 544 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 88 PID 544 wrote to memory of 3144 544 65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe 88 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91 PID 3144 wrote to memory of 4088 3144 idemoodp0cetka.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65f881fdf4a2882ed0438defcacff6b7_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"C:\Users\Admin\AppData\Local\Temp\idemoodp0cetka.exe"4⤵
- Executes dropped EXE
PID:4088
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD565f881fdf4a2882ed0438defcacff6b7
SHA11d68227701963bd462c59bd68f710ad88bcd45f9
SHA256ed11b132a81db29a8e6eb1d3f68014303a3517440ade8648e04ca1d7bca38364
SHA5124668468c22343f73016448d1f82676647ba72e867aa9667f23edf8ffe5c1b524cd2e2e469a7f8e9230630b6386c76becaaad2f8bc38761c9d477a72961953520