Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe
-
Size
16KB
-
MD5
156859d274545c043c3e7a8e201d9c99
-
SHA1
c5c66160478520b06eac1071ae2ce4852dc34075
-
SHA256
4518b0fbd154e48997f7893d76ac91556ec762268095863348235333801e7264
-
SHA512
58f404b0e630b34fe53ae022a7c369c2674777a3d840fb0ef52bcba71911a026dea9215374f5916cb49775cdbfbe40928b947521ba7ff542c058862ee0472689
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYlh:hDXWipuE+K3/SSHgxmlh
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2840 DEM1249.exe 2672 DEM6825.exe 2748 DEMBD75.exe 1852 DEM12E5.exe 1212 DEM6826.exe 2356 DEMBD66.exe -
Loads dropped DLL 6 IoCs
pid Process 2100 156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe 2840 DEM1249.exe 2672 DEM6825.exe 2748 DEMBD75.exe 1852 DEM12E5.exe 1212 DEM6826.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2840 2100 156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2840 2100 156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2840 2100 156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe 29 PID 2100 wrote to memory of 2840 2100 156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe 29 PID 2840 wrote to memory of 2672 2840 DEM1249.exe 31 PID 2840 wrote to memory of 2672 2840 DEM1249.exe 31 PID 2840 wrote to memory of 2672 2840 DEM1249.exe 31 PID 2840 wrote to memory of 2672 2840 DEM1249.exe 31 PID 2672 wrote to memory of 2748 2672 DEM6825.exe 35 PID 2672 wrote to memory of 2748 2672 DEM6825.exe 35 PID 2672 wrote to memory of 2748 2672 DEM6825.exe 35 PID 2672 wrote to memory of 2748 2672 DEM6825.exe 35 PID 2748 wrote to memory of 1852 2748 DEMBD75.exe 37 PID 2748 wrote to memory of 1852 2748 DEMBD75.exe 37 PID 2748 wrote to memory of 1852 2748 DEMBD75.exe 37 PID 2748 wrote to memory of 1852 2748 DEMBD75.exe 37 PID 1852 wrote to memory of 1212 1852 DEM12E5.exe 39 PID 1852 wrote to memory of 1212 1852 DEM12E5.exe 39 PID 1852 wrote to memory of 1212 1852 DEM12E5.exe 39 PID 1852 wrote to memory of 1212 1852 DEM12E5.exe 39 PID 1212 wrote to memory of 2356 1212 DEM6826.exe 41 PID 1212 wrote to memory of 2356 1212 DEM6826.exe 41 PID 1212 wrote to memory of 2356 1212 DEM6826.exe 41 PID 1212 wrote to memory of 2356 1212 DEM6826.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\156859d274545c043c3e7a8e201d9c99_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\DEM1249.exe"C:\Users\Admin\AppData\Local\Temp\DEM1249.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\DEM6825.exe"C:\Users\Admin\AppData\Local\Temp\DEM6825.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\DEMBD75.exe"C:\Users\Admin\AppData\Local\Temp\DEMBD75.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\DEM12E5.exe"C:\Users\Admin\AppData\Local\Temp\DEM12E5.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\DEM6826.exe"C:\Users\Admin\AppData\Local\Temp\DEM6826.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\DEMBD66.exe"C:\Users\Admin\AppData\Local\Temp\DEMBD66.exe"7⤵
- Executes dropped EXE
PID:2356
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD56d80ac7585e9541f212b2818b278834d
SHA1349f4e62577267529374693e4b9b57702967a370
SHA25648ca2d37d580fae3a90d632b2a7eac4ac48cb7d1a0f30eb829b6c95648c455eb
SHA5125917b893b15991d4c0268c77b4a52f9dc00d307015a151dc78bf39cf95b4094ec395b1c455d4c0bef5d30bfe22e74892df9671a7e0119a2ca66745a7e141965a
-
Filesize
16KB
MD53106a3aefca53bbc83d283c7209a9cb9
SHA18ee7e04790d4854a04bc913ab8ca85d7488d09ce
SHA256e7ca8e2d7a009bbc57a1db88c675f5fc9467cd635e3e793bd78755c8c35bbd15
SHA512ed55776640f7b46e631933a544199c2d7b157efe5b2369f3cce9481a0f91c4316005f617cf3c150c2ee5b75053cd52804490472f1254d363d922675cb335ee4c
-
Filesize
16KB
MD56d6d14f3aee313ee47fb8bc16be40dc3
SHA154581e39651ece8e772f7094128b520c30371dcb
SHA256e63f9192ee5b3a39a773a9007055fd8a0ed59753251a2f1bc81a35d1775689e8
SHA5120953c6b54422e28173d38490ccaca936ebe76e283d2882719a3541b8f4a060fd0be2250ecce5ec141be2ba355ae9392767acb0b202fd3b22d7254441ec754735
-
Filesize
16KB
MD549b05c92d7a38ba99dbae575bb7cbb7f
SHA1ce6238198ce306ca314f71df72fafcf1c8825d4b
SHA256937286505a6435914fdc95bc9b631c3ee9eb52bd4ac6a7271dc432976a693091
SHA512729b6912c2898c6e86b0cc1973871067d931deda6c13969ae2fac3e405bdfa1eefd35e6dbd06884fbaf1b2797aaef5da65ce6f98d8c5e59a064ffc9a0c8cb170
-
Filesize
16KB
MD50e56b7bf76eb0019745daad070fce4a1
SHA19d72042123eb15f0f013367f499340d9761f16b7
SHA256e4a67115520f3987f3d4246796a7c15e6277cf8ce9368e5bc952eb7657f5f301
SHA51251c13651ec84ccd427b14756a969a8660f8f3fa780c2b782aa07df83dd611dec15f7d945adf9c9588be3d682a68159c52a4777c70c49e91f0bfa5a8226d79f98
-
Filesize
16KB
MD5fd1bc84bb56f4c5fb7fb773c3ffb2bff
SHA1de80db4248f6d32958ed3e04650a0049fdebb431
SHA25613638e7ab4d3ef3dc35c5a14416baff1bfe7a88f5096d13fa4d30c952cc88ae5
SHA512472c8148b99197bc4c3f254f8dcbdb89436b24b16aff1178cf18dd7be93ba648e838c3f50f79ddbb92f07d7c9eb433a206e3a0eaed9d948bee1edd22b0376a6c