Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 02:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe
Resource
win7-20240704-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
5 signatures
150 seconds
General
-
Target
65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe
-
Size
316KB
-
MD5
65dc16213a81c6e15d7becb20756d40e
-
SHA1
d2eb034e79da0c3395107e667b2ae2c7d3e6923b
-
SHA256
53072ff0b15956bde023ff3f38d6bc6dc1f804c8840583bab9700724d7ce3f9c
-
SHA512
9a5d9a1b4229dba25e09f7da1b1b54879e0a6d986a8de6802ccbdd8bc75b5701d720b8e4a0f72f5c9c3663c89c88d1399f09434f82ec4d1d4690f7e4a207eb8f
-
SSDEEP
6144:6sGTsoNQlHv4GJpU0lCbfWmyGZ8nVW5GJZ2tNYLj8MfsFqPHnOff:RGTg1lJpU0TGWVzYKj86sFIHg
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 PID 3020 wrote to memory of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 PID 3020 wrote to memory of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 PID 3020 wrote to memory of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 PID 3020 wrote to memory of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 PID 3020 wrote to memory of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 PID 3020 wrote to memory of 2436 3020 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 84 PID 2436 wrote to memory of 3440 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 56 PID 2436 wrote to memory of 3440 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 56 PID 2436 wrote to memory of 3440 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 56 PID 2436 wrote to memory of 3440 2436 65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65dc16213a81c6e15d7becb20756d40e_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2436
-
-