Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe
-
Size
33KB
-
MD5
23440f371220f5473ee19450f12d9e28
-
SHA1
4da5871b1a75d1c4ffcf0b1f479f5eaf7d14d8dd
-
SHA256
a1a8dbfdf668d614386ac24cdfea52df2d58e472f11837ddacd92867cc1b4d71
-
SHA512
8ce3e8351ee7244b9dd34add94a7e9eb1643ca2ada727a63a65b8d3595f84716b7b8f101bff055baafab893cd96cefaa2fd61d74bf7f0cdc9e3d53e2a4016183
-
SSDEEP
768:kf1Y9RRw/dUT6vurGd/pkUOyGAv+rh95kRCalySylZyya:GY9jw/dUT62rGdiUOWWrNlg
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 2392 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 1940 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 1940 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2392 1940 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 28 PID 1940 wrote to memory of 2392 1940 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 28 PID 1940 wrote to memory of 2392 1940 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 28 PID 1940 wrote to memory of 2392 1940 23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23440f371220f5473ee19450f12d9e28_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5bf33311794ce1426fd9c5774d9df50fb
SHA11b4301a5d27870750bcf27e66f6b08532a7e1831
SHA256bda7eb6375347db16875ad491d845b50d126aacf5a858596e45e8a610567d08e
SHA51232f2d934d0d218f65be8f9d3efe419878ee80313dd1f401dc73b25081f3e875e48cdc043e5f88ab085d3dc7fffc4a42595efdcb9ac2531b999c5193de0b7cdeb