Analysis
-
max time kernel
93s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gyyrofsvwt.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/gyyrofsvwt.dll
Resource
win10v2004-20240226-en
General
-
Target
abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
abb26d1600dda55b1004b39d569178a8
-
SHA1
8e6cba40d4ddd9d6ff6b781f79febbb47e58855b
-
SHA256
1d0e997a1e0cca7446644a5082da18ea191862c85a3e222b0296bdb158c2a387
-
SHA512
8d560a240bba2f915ff5a7b05bd061cbc68c8ce2268ee8b6815834f00452232e4f63da89e8d9b565dec45f0e9df232931676caae8ac6242995d14ad1222eb3e4
-
SSDEEP
12288:Jr5aOWToieigTrpPJQ1eFm06ua4xQ4HXXjwFROQcPf/6Pk15BOVCFrMJTpSLmTwJ:x5yyRZZ324nj2RGnyatKMgGphLdPe7kR
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 5264 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5136 5264 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5264 wrote to memory of 3696 5264 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 84 PID 5264 wrote to memory of 3696 5264 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 84 PID 5264 wrote to memory of 3696 5264 abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5264 -
C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abb26d1600dda55b1004b39d569178a8_JaffaCakes118.exe"2⤵PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5264 -s 9922⤵
- Program crash
PID:5136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5264 -ip 52641⤵PID:5144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5593ae51744a3a1518c88249d88f6e0d8
SHA1799fc91d7871e4387fd487da8c066a5908263088
SHA256f5b07baf233029ae6a86a512fd84161c07d27827ef0222eea9783296249f646b
SHA51291d538a964f803b97b5983ca7bfab265cbfca1d481c9da7038d478bef56cea033cd9fc7acaf18b5a9680fb684cacab950df66fc9b4264ba8b5ed63c56e80cf6a