Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe
-
Size
353KB
-
MD5
146356c4506546b22c77cd7d0b58d970
-
SHA1
23b39773fbc58c5bca6a38bfc442e7ab39bacc63
-
SHA256
2440d5eb8dee5eb8277ed8e103425c33cd1f5672058384ead1d9d7562c91fcd0
-
SHA512
98bc5d10c3905c770dbceb75e74b5e5f8d29bb8f88b9a3f93e005424ed313d932f459ca64e73888dfa817bd337ec38e60190a0fcc02ee69eea1e48b191f2a86f
-
SSDEEP
6144:d3o/V+zfng5D5mDRWCDDyQUKyel3QsGMYTjNal317jE2dHINjZAB2G48Yn5:aKfmmE+yQCel32bXNa3dHdotqwp8Yn5
Malware Config
Signatures
-
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" 0FFvh45S7nBeCS8Y.exe -
resource yara_rule behavioral1/memory/2520-2-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral1/memory/1664-9-0x0000000000400000-0x00000000004CB000-memory.dmp upx behavioral1/memory/1664-10-0x0000000000400000-0x00000000004CB000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\0FFvh45S7nBeCS8Y 0FFvh45S7nBeCS8Y.exe File opened for modification C:\PROGRA~3\0FFvh45S7nBeCS8Y 0FFvh45S7nBeCS8Y.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0FFvh45S7nBeCS8Y.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main 0FFvh45S7nBeCS8Y.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Use FormSuggest = "Yes" 0FFvh45S7nBeCS8Y.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1664 0FFvh45S7nBeCS8Y.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2520 146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1664 0FFvh45S7nBeCS8Y.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2520 146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe 1664 0FFvh45S7nBeCS8Y.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1664 2520 146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe 31 PID 2520 wrote to memory of 1664 2520 146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe 31 PID 2520 wrote to memory of 1664 2520 146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe 31 PID 2520 wrote to memory of 1664 2520 146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\146356c4506546b22c77cd7d0b58d970_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\PROGRA~3\0FFvh45S7nBeCS8Y.exeC:\PROGRA~3\0FFvh45S7nBeCS8Y.exe2⤵
- Manipulates Digital Signatures
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1664
-