Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 01:19
Behavioral task
behavioral1
Sample
37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe
-
Size
16KB
-
MD5
37c28dd5c1e185c5cded257ad6c91c03
-
SHA1
3f84157f5bbfeebd135220130a8b0bd616017545
-
SHA256
1e2813f4a23f085eb4812095a26d592902cda2582e190e162c3f7dc3825c5c1b
-
SHA512
f7cab8fc08ff970577b6a1b79743fbedb53eb4318394f6e0c54efc575c709d55b74d33c3bf7e0b7ad5c1b625a384538ee1434caf460eb158e5352efc08ed3b41
-
SSDEEP
384:5wP9YbWZbqSmvklj4kHwxVNECwodNyPVuXzFsY:2VYK4BvkljwxoC5h
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\mtklef = "{E8A30204-FEEF-4D24-55B4-E099EA70E5A5}" 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\ndisrd.sys 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1244 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\tctc32.dll 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1244-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1244-7-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8A30204-FEEF-4D24-55B4-E099EA70E5A5} 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8A30204-FEEF-4D24-55B4-E099EA70E5A5}\ 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8A30204-FEEF-4D24-55B4-E099EA70E5A5}\InprocServer32 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8A30204-FEEF-4D24-55B4-E099EA70E5A5}\InprocServer32\ = "C:\\Windows\\SysWow64\\tctc32.dll" 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8A30204-FEEF-4D24-55B4-E099EA70E5A5}\InprocServer32\ThreadingModel = "Apartment" 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1244 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1204 1244 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD58bf32bb81490a0c0428ff8b6f59ee042
SHA1959550372bfb3e254057c750bf858df375e8848e
SHA256f48fedceac21e1b76871f30d84786d2bc3c6de854d0d58ea3f6a53f6f16a03db
SHA5129caeefa2a2d275983b29a8fc454e3fa140b0217533d9102f722381bbf3d6a76db708de7d4da3c6ec1687c9896752e8c5137276ee2db0b0eaa903bb9dde8b6b48