Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe
-
Size
16KB
-
MD5
15656101b69dfe351f10a27cf33dd217
-
SHA1
3a17fabb058fbee0427c0b6225107865e79f6e16
-
SHA256
d3aee4c5ebcddb31a83807d81372c50747225e2d765b4f69980584209d104437
-
SHA512
edf3a69dc9de358e8cff8549d714cd540bec4e06dbbb10124bb0853d89ebeb2fe33de70ae49643f2aee0a174334a72289c35b3f9df9ddb6edb063cb954839b59
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4Yh2O:hDXWipuE+K3/SSHgx0O
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2576 DEM2AD8.exe 2448 DEM8076.exe 2664 DEMD5D5.exe 1712 DEM2B26.exe 780 DEM8047.exe 2412 DEMD604.exe -
Loads dropped DLL 6 IoCs
pid Process 1220 15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe 2576 DEM2AD8.exe 2448 DEM8076.exe 2664 DEMD5D5.exe 1712 DEM2B26.exe 780 DEM8047.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2576 1220 15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe 29 PID 1220 wrote to memory of 2576 1220 15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe 29 PID 1220 wrote to memory of 2576 1220 15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe 29 PID 1220 wrote to memory of 2576 1220 15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe 29 PID 2576 wrote to memory of 2448 2576 DEM2AD8.exe 33 PID 2576 wrote to memory of 2448 2576 DEM2AD8.exe 33 PID 2576 wrote to memory of 2448 2576 DEM2AD8.exe 33 PID 2576 wrote to memory of 2448 2576 DEM2AD8.exe 33 PID 2448 wrote to memory of 2664 2448 DEM8076.exe 35 PID 2448 wrote to memory of 2664 2448 DEM8076.exe 35 PID 2448 wrote to memory of 2664 2448 DEM8076.exe 35 PID 2448 wrote to memory of 2664 2448 DEM8076.exe 35 PID 2664 wrote to memory of 1712 2664 DEMD5D5.exe 37 PID 2664 wrote to memory of 1712 2664 DEMD5D5.exe 37 PID 2664 wrote to memory of 1712 2664 DEMD5D5.exe 37 PID 2664 wrote to memory of 1712 2664 DEMD5D5.exe 37 PID 1712 wrote to memory of 780 1712 DEM2B26.exe 39 PID 1712 wrote to memory of 780 1712 DEM2B26.exe 39 PID 1712 wrote to memory of 780 1712 DEM2B26.exe 39 PID 1712 wrote to memory of 780 1712 DEM2B26.exe 39 PID 780 wrote to memory of 2412 780 DEM8047.exe 41 PID 780 wrote to memory of 2412 780 DEM8047.exe 41 PID 780 wrote to memory of 2412 780 DEM8047.exe 41 PID 780 wrote to memory of 2412 780 DEM8047.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15656101b69dfe351f10a27cf33dd217_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\DEM2AD8.exe"C:\Users\Admin\AppData\Local\Temp\DEM2AD8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\DEM8076.exe"C:\Users\Admin\AppData\Local\Temp\DEM8076.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\DEMD5D5.exe"C:\Users\Admin\AppData\Local\Temp\DEMD5D5.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\DEM2B26.exe"C:\Users\Admin\AppData\Local\Temp\DEM2B26.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\DEM8047.exe"C:\Users\Admin\AppData\Local\Temp\DEM8047.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\DEMD604.exe"C:\Users\Admin\AppData\Local\Temp\DEMD604.exe"7⤵
- Executes dropped EXE
PID:2412
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD56cd8fc6b71d003bbf59017b56d14f6a7
SHA1c73625fbbfdcecab592d28e828b473cbfaf9584e
SHA2568cfdadc37f774b899cbc6ccba843537216a5dac83d5dd448478f7a7033017854
SHA512b4dbd7374c80a648b44345ea89fb744b8265ed7353e6ceb4a70e8843100bf039d85f3fcccba16bafe8b51a8f6f72fdfa8614d686448367f775be3026fb6b3dd3
-
Filesize
16KB
MD52f9b2fdfc339f1b3eb438239892f4b3e
SHA19392f76a0be66f3ead814ad3943c250975d5ccfa
SHA256b1095b49ff547cf0d2e36dbc1b8c1f882016914dac82e4d95290d4286fe62f79
SHA51239725725306c8b7b33c4e4a3fdf07c97eb32675bd1b28766eb8566b99e1da7a1a59200a255b8fe626fed1112141ee4bf9353538413cbfe6957765604a3959927
-
Filesize
16KB
MD5a49b7ed969ec749d3f9d77817022a6fb
SHA148a6be242bb6c398f58f5b73ecc8b9108c7b996d
SHA256284e45c3c0a2c2c819a21ad426e015053e213f632286b7a6ad98da13f31b6e81
SHA512cfeceedf8453d9893e400f32316b8aced07fa3438d12d06377ac865e8e8d399ed627a9ed9b65368f503ca671b8d9d4535fe907218a59d3e47ff4b0f75137ce32
-
Filesize
16KB
MD581bbe9490a345413fad469b0319be21e
SHA11b80989f6acb357e897d78e4da122c08eb996981
SHA2563b731f5617a76c2b97a36e8069e8d2aedac252d7ea01852456b08b8f1d77b53e
SHA51218cbc49e8359dd81903e7b646bedfa76895d1a8c12a77a512daffa2bb765b0bb08c423e154ed583f6c293860a6deb74aa6d26b49a1d091973aa139662175dfcb
-
Filesize
16KB
MD515ea4f772e455b647d5717b32d3e29e5
SHA181958ab9bf021b2c2a4d063c10f095b5581a9ada
SHA256715963493b805cca1a5de0e206470dbaf3d45eae2c52ac9febcb46a79a8f241e
SHA512fec039076cdc3883a8d21733ff05fb21e1bc3a45eb983e311112b114920e3c286e9f5a44add72891998fefbf36ea883516033c5162c8bf3339da18a0d770c751
-
Filesize
16KB
MD5a2c821f8fcc03baf10ec73dcef36dbdd
SHA1abe13d85d7700241f03b5a5c666d52f0bbeba5a2
SHA256bc7fbdd9612a54d91c429b96e44a9ffd45bf12c1f01ccf6bb37c691e2097e119
SHA512fbacf99dcbbac8a1ae2d097b68099c2697985378596dd2f294538e0a4a6a18fa30a2b76370b5aac19ff5f042b40704d4c2d2c09e4d5225bb4d30ed0755b8bd23