Analysis
-
max time kernel
131s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe
-
Size
16KB
-
MD5
2275d7908bf208d91ada289d859c5350
-
SHA1
37419f08f1288c075e3c6c763f9e052dd7229e60
-
SHA256
3a2daa10563cfb3deb74346cb1cf504c719de24de6f738301814cf27bd742509
-
SHA512
d38c6f2d4be72c97945e8459ba23cef48311e62b8ad7d186789e2e931b9fd95d6eb41eb7b0a44be907dcbfb114788cef2a7c2f2f275937e5a6df6367cd12130e
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY5d:hDXWipuE+K3/SSHgxmL
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2656 DEM18FD.exe 2532 DEM6E4D.exe 1368 DEMC38D.exe 920 DEM18AF.exe 2696 DEM6DE0.exe 844 DEMC2E2.exe -
Loads dropped DLL 6 IoCs
pid Process 2452 2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe 2656 DEM18FD.exe 2532 DEM6E4D.exe 1368 DEMC38D.exe 920 DEM18AF.exe 2696 DEM6DE0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2656 2452 2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2656 2452 2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2656 2452 2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe 29 PID 2452 wrote to memory of 2656 2452 2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe 29 PID 2656 wrote to memory of 2532 2656 DEM18FD.exe 31 PID 2656 wrote to memory of 2532 2656 DEM18FD.exe 31 PID 2656 wrote to memory of 2532 2656 DEM18FD.exe 31 PID 2656 wrote to memory of 2532 2656 DEM18FD.exe 31 PID 2532 wrote to memory of 1368 2532 DEM6E4D.exe 35 PID 2532 wrote to memory of 1368 2532 DEM6E4D.exe 35 PID 2532 wrote to memory of 1368 2532 DEM6E4D.exe 35 PID 2532 wrote to memory of 1368 2532 DEM6E4D.exe 35 PID 1368 wrote to memory of 920 1368 DEMC38D.exe 37 PID 1368 wrote to memory of 920 1368 DEMC38D.exe 37 PID 1368 wrote to memory of 920 1368 DEMC38D.exe 37 PID 1368 wrote to memory of 920 1368 DEMC38D.exe 37 PID 920 wrote to memory of 2696 920 DEM18AF.exe 39 PID 920 wrote to memory of 2696 920 DEM18AF.exe 39 PID 920 wrote to memory of 2696 920 DEM18AF.exe 39 PID 920 wrote to memory of 2696 920 DEM18AF.exe 39 PID 2696 wrote to memory of 844 2696 DEM6DE0.exe 41 PID 2696 wrote to memory of 844 2696 DEM6DE0.exe 41 PID 2696 wrote to memory of 844 2696 DEM6DE0.exe 41 PID 2696 wrote to memory of 844 2696 DEM6DE0.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2275d7908bf208d91ada289d859c5350_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\DEM18FD.exe"C:\Users\Admin\AppData\Local\Temp\DEM18FD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\DEM6E4D.exe"C:\Users\Admin\AppData\Local\Temp\DEM6E4D.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\DEMC38D.exe"C:\Users\Admin\AppData\Local\Temp\DEMC38D.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\DEM18AF.exe"C:\Users\Admin\AppData\Local\Temp\DEM18AF.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\DEM6DE0.exe"C:\Users\Admin\AppData\Local\Temp\DEM6DE0.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\DEMC2E2.exe"C:\Users\Admin\AppData\Local\Temp\DEMC2E2.exe"7⤵
- Executes dropped EXE
PID:844
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58f2cc82cb21976dbfded75cc065872b5
SHA1f30247a915856cc74a25bb8233e27de8b3424948
SHA256198bad38a4545d23c777f261b75add86adb8f077a78d91ea6483e25af6a42c77
SHA512c48d87903e126cd4e7d31d7aa9f2cd7d6d21a83974ebbf392075af737b2f5a84bb9a068b6ced94f764d9d74118292b75702b1c2b3fa177e754de1ba833669b27
-
Filesize
16KB
MD5ba9a9b4ac8877d6abafceb4cc36c81ae
SHA16ab530c3853660f9feb2933c32312f66365f50ab
SHA25668a3c0f0401e806369c8419c4b9e067bef98fd0394a4399d9715dbe505d57341
SHA512dd527505687960edcf2c7c638319ad5641afd8669a2c0c81fea1b68810e8b3aca8fcd9f1fc8f56c01701f3d7d9afb6b303276108f640b7223e901355ba4500c8
-
Filesize
16KB
MD58a6cbb930614b8174109cc998ff3a3a6
SHA152a57eb3db1e4596b00fa4d3e9b0e2c199c050cd
SHA2565c3ac2445bef3144e920f3ebf1bdb6d57bd35dcd70e04fa222aab46b182c0177
SHA512082df285ced7925ff3f387ed3dc1a360f956d167108c12183d391b2f7ee5af37d51bf1c2a3997f4168008e23b81caa9fbdf45e0e38eb3f126938dad7269a6139
-
Filesize
16KB
MD5a2e4d8d78b09ee2c570fb25fec7e38b7
SHA11063eac28e731df63061d10dde2ad67d8693f5b9
SHA25617b35217afb734b623028cba6681f8d7179d8a7bd2a2331a251426e918f708ec
SHA5128d71d385522ad9dd4af2ba135e5e4b069801f7c90fc67c686c1c3f2442bf758b7326097a5bb0520cb878b25dc96c296d8ecea416992d89caab8a3db2436745d0
-
Filesize
16KB
MD585001f2dbd91884055f3c10219973d63
SHA1f0329aacea12ac9000a741eba496ff7be67d3edb
SHA2569b471f1f7c5c6f76baadb28423d1e58e2502ca226a14256006015898aff32588
SHA512e577252e164ae77cc2e8c9b73b2d1bd8ba2dab175cf7dd36820b145bef22a7c7c31db0e4c1a8571b3b5a1370ddbb13525ce5dcd4f22436edf579717551bd782f
-
Filesize
16KB
MD5e6f41daa54d3c9dc74232fa3787c14c1
SHA14b2e8c83dc710c22df10c1a3c1e601928cd952cd
SHA25641a9d88be5a45ab7f6594537d084e3eb0f77094178d04bc27710d26daaf4981f
SHA5122ec23b60803fa34dfe4761e24af47b0cd9bf281b6080e642b97b5fa57caef9019cb09140d355c96df0506fafdc4217f70980529e76ef46323bb2c497425e5aec