Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe
-
Size
16KB
-
MD5
29bc7ef7be718035ebfb32c18389e45b
-
SHA1
1cd47a044006a68d9b0b1fc9c91a23e75f9bb173
-
SHA256
45b0a67ca1187808310dc06a50c344bb9d292bcc313b78d357384fe764cd2451
-
SHA512
194b25f70b68ba3972f1ed7f4cf227e33d2ea35a796b6a49035e67f9b837e1719aa60bad21659624561da79f446d26d75f12bec61b482a02150d67c4654b61e5
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYr:hDXWipuE+K3/SSHgxmr
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2596 DEM12C6.exe 1708 DEM68E1.exe 1360 DEMBE11.exe 1752 DEM1342.exe 2032 DEM695D.exe 2188 DEMBE9E.exe -
Loads dropped DLL 6 IoCs
pid Process 1900 29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe 2596 DEM12C6.exe 1708 DEM68E1.exe 1360 DEMBE11.exe 1752 DEM1342.exe 2032 DEM695D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2596 1900 29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe 29 PID 1900 wrote to memory of 2596 1900 29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe 29 PID 1900 wrote to memory of 2596 1900 29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe 29 PID 1900 wrote to memory of 2596 1900 29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe 29 PID 2596 wrote to memory of 1708 2596 DEM12C6.exe 31 PID 2596 wrote to memory of 1708 2596 DEM12C6.exe 31 PID 2596 wrote to memory of 1708 2596 DEM12C6.exe 31 PID 2596 wrote to memory of 1708 2596 DEM12C6.exe 31 PID 1708 wrote to memory of 1360 1708 DEM68E1.exe 35 PID 1708 wrote to memory of 1360 1708 DEM68E1.exe 35 PID 1708 wrote to memory of 1360 1708 DEM68E1.exe 35 PID 1708 wrote to memory of 1360 1708 DEM68E1.exe 35 PID 1360 wrote to memory of 1752 1360 DEMBE11.exe 37 PID 1360 wrote to memory of 1752 1360 DEMBE11.exe 37 PID 1360 wrote to memory of 1752 1360 DEMBE11.exe 37 PID 1360 wrote to memory of 1752 1360 DEMBE11.exe 37 PID 1752 wrote to memory of 2032 1752 DEM1342.exe 39 PID 1752 wrote to memory of 2032 1752 DEM1342.exe 39 PID 1752 wrote to memory of 2032 1752 DEM1342.exe 39 PID 1752 wrote to memory of 2032 1752 DEM1342.exe 39 PID 2032 wrote to memory of 2188 2032 DEM695D.exe 41 PID 2032 wrote to memory of 2188 2032 DEM695D.exe 41 PID 2032 wrote to memory of 2188 2032 DEM695D.exe 41 PID 2032 wrote to memory of 2188 2032 DEM695D.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29bc7ef7be718035ebfb32c18389e45b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\DEM12C6.exe"C:\Users\Admin\AppData\Local\Temp\DEM12C6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\DEM68E1.exe"C:\Users\Admin\AppData\Local\Temp\DEM68E1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\DEMBE11.exe"C:\Users\Admin\AppData\Local\Temp\DEMBE11.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\DEM1342.exe"C:\Users\Admin\AppData\Local\Temp\DEM1342.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\DEM695D.exe"C:\Users\Admin\AppData\Local\Temp\DEM695D.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\DEMBE9E.exe"C:\Users\Admin\AppData\Local\Temp\DEMBE9E.exe"7⤵
- Executes dropped EXE
PID:2188
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5024111b435fabf5e669fc2ce1ee4877c
SHA1cae746c116b7bfa2f510948890061c185f2b5910
SHA25600572320ed43dd2d3e7476aa39c2d7d9cea1ee13ea5ba66567a215851c0dbc8f
SHA512fdd757c8c35e18fd5b2ea1f8fbab079d3833930627cb4f98c719472a5e0621c77c478036b9705f0d97759ee0af0c889b74b70935958bbc090b0e0593e8b17b84
-
Filesize
16KB
MD5206abacc7328b30320cba4deadd45b5e
SHA14f088918828024c2989b6867bfe4605f280d14ec
SHA256166ade04b162a0ddeba10dbcec7bdd27778b8112223db38a0738d644ebceb81d
SHA5120fbce70bbbb5f98b5df425faeec9f69bf1c5ee8bcad3b9ce380a7c1e69cda1f55f63212905b8b36d28bc343b4c3ad9fd6990b977bac12d3ab3239c819e3dc804
-
Filesize
16KB
MD5e0e31c4f2604b8999e5a24b4afb7ece0
SHA1c5344163315011f1ac673e6c7f9f24dfcea521c8
SHA256daf7a2b02b1e11e4f5376fda2f687982999e2812e9cf64dab73804f2ba867ffc
SHA51289dbf5551fe96ba7a002a4ed959daec47e2177769b55cdced2d91c57996d1c9d21bc9ff48d1218313fc4cc0f5f9e8e88965e3d9b63376f9d9b931179fe9b1bdc
-
Filesize
16KB
MD55b9b974d61cd28c7e8306b3a434176b5
SHA1599dfac4a93de62b3ad615be6f8e59f496179d2e
SHA25684fa6a746f796f8670d8d78ef641af48787fdeb6e5cb39e78a1fa73c33465e7a
SHA5127afa7138f17ffda1cfae5c23e082e76f19f60e0377488e1e678c2af9e24125dbb8b974304538190327dfc1cecbdbd1d17d1c748952d983fbe7c9aad4695f5e4f
-
Filesize
16KB
MD583f9ce0ab42a7ca7ff54f5bc56798876
SHA11693f6c8043ef49ed4862e464cf9345d952e8285
SHA2563a5dc74f06b542aada1c5d8e65599c98568bcda01fcf32fbe98797b5e23e2936
SHA512f723bd89395dd2d6b899195e12243806643042f9a5896d3a22f11651b4c2a5bce9ab91482bd81dd21bf39dca7c89d2b33af14bae22b175ce3a6bc9221f451104
-
Filesize
16KB
MD53a074bac3e377adf9adf0f90d72743b2
SHA147339968eaf9c570001ad939fc08a5b449d8c0da
SHA2569833a4e68a9ee0930fa405b0ce959bc528ab1d289eb80c75995e982687c933b9
SHA5122ef7d133be33d1a9a37afb819aeb1239e70c90d1b8f315cd46877bbc468d4c063bedb18685dfd50acc38e5ea59ecd563934cc5c742845203ecc0fa7a969531d9