Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 18:35
Behavioral task
behavioral1
Sample
bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe
-
Size
285KB
-
MD5
bfb7634d04e19d55bdffee5ff3f3bda0
-
SHA1
e6b702c3eacb93d3e6615f41b3440b44c57bd63e
-
SHA256
3d58d111ae5a63495a3c74a063b30011a25b828b417ae9a4373f3fd0d55d5925
-
SHA512
3d309b496eecc1bda9fae766fee2f3ee6d183bda9821ed2b0b97372933d019f58a9a12e3b030bd6cbb1d15803098b44d5e153817aee08630767040a514d13d57
-
SSDEEP
6144:T1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe/ZVMXTw:TjkArEN249AyE/rbaMct4bO2/n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 tcpscrex.exe -
Loads dropped DLL 4 IoCs
pid Process 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2096-1-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/files/0x0037000000015cff-7.dat upx behavioral1/memory/2096-11-0x00000000049E0000-0x0000000004A94000-memory.dmp upx behavioral1/memory/2096-22-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-24-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-27-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-28-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-29-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-30-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-31-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-32-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-33-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-34-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-35-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2620-36-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2096-1-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2096-22-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-24-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-27-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-28-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-29-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-30-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-31-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-32-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-33-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-34-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-35-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe behavioral1/memory/2620-36-0x0000000000400000-0x00000000004B4000-memory.dmp autoit_exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Managemenot\Monitor\tcpscrex.exe bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe File opened for modification C:\Program Files\Managemenot\Monitor\tcpscrex.exe bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe File created C:\Program Files (x86)\Activxr\Rescuer.exe tcpscrex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe 2620 tcpscrex.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2620 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe 29 PID 2096 wrote to memory of 2620 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe 29 PID 2096 wrote to memory of 2620 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe 29 PID 2096 wrote to memory of 2620 2096 bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfb7634d04e19d55bdffee5ff3f3bda0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Managemenot\Monitor\tcpscrex.exe"C:\Program Files\Managemenot\Monitor\tcpscrex.exe" 0.0.0.02⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD592054a1bdb7be49ed11c5a3987e80135
SHA10c1921966d89285a691069c2ca9d98646c2dc1e9
SHA25619893b4881325485faf2f2f61ce66976a78d06e20ba6352c26fa206d7b030d17
SHA512a22c5b6733cbbd086e4b1a36ee3c23e5e5c105bdb2389bf89cd843ff0ebf2e4df36413682391a7e6041b025bce2c9ba7c3a60e0bc82e1492c0009f3550d2e46f