Analysis
-
max time kernel
152s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 10:54
Behavioral task
behavioral1
Sample
2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe
-
Size
285KB
-
MD5
2024e37275ce455a8f32b7ca62aa8126
-
SHA1
c8d0816704f0cf8be3c1c033db2b2f2cd88446cd
-
SHA256
c245f6d3b61c458dc12a1b95ecef3b3f6768343a880306558991d8e47524f405
-
SHA512
b6285d6bdc3eedcac5b75dc36ffda73c6717374ae5dddfee224f190d1cb4dffad090dfe1661e2d15ab1ce19f28df21633f6917f5d327c812d0d896b67415eab0
-
SSDEEP
6144:q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe/ZVMXTw:qjkArEN249AyE/rbaMct4bO2/n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 tcpscrex.exe -
Loads dropped DLL 4 IoCs
pid Process 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2688-0-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2688-1-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/files/0x0034000000016d22-7.dat upx behavioral1/memory/2688-23-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-24-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-27-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-28-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-29-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-30-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-31-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-32-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-33-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-34-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-35-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2612-36-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2688-1-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2688-20-0x0000000004B80000-0x0000000004C34000-memory.dmp autoit_exe behavioral1/memory/2688-23-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-24-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-27-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-28-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-29-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-30-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-31-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-32-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-33-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-34-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-35-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2612-36-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Managemenot\Monitor\tcpscrex.exe 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe File opened for modification C:\Program Files\Managemenot\Monitor\tcpscrex.exe 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe File created C:\Program Files (x86)\Activxr\Rescuer.exe tcpscrex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe 2612 tcpscrex.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2612 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe 29 PID 2688 wrote to memory of 2612 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe 29 PID 2688 wrote to memory of 2612 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe 29 PID 2688 wrote to memory of 2612 2688 2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2024e37275ce455a8f32b7ca62aa8126_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files\Managemenot\Monitor\tcpscrex.exe"C:\Program Files\Managemenot\Monitor\tcpscrex.exe" 0.0.0.02⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5bd80c124a9df1c003f410d9ed9079226
SHA104862e7054dcef9670695b88138731b0989e2e82
SHA25634eb5ce170c47137cce27d5e9a96dfb078f481f86f616d9320c22d718a360259
SHA512383cdd56c2ccb22ccca0bfa0d5d469e71b12b51ee209e857bd738dd153250d1e573db4ff2ba7381b1d4f1e45df9a03a9f11864482703cf02a85806dbd64d6dce