Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe
-
Size
14KB
-
MD5
c3205ba22e31f513db9f555cf4fd7f23
-
SHA1
799ded4daa2f278d7c8a9b1e63bcc4b676e00733
-
SHA256
f74cf3063220d8ff8754ea7a749c3f90cba4ef1db01e065f263f60050792b120
-
SHA512
5cc0a4972fdbe433bebe6d757ffcfc9114d02b3c08dae92b31ff2bcd00237a2ff2253315bfa046a3b44160eb82e72aa6c89edaefc2d1cbaae5f6b15beb9f2acc
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY5Hj:hDXWipuE+K3/SSHgxmdj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2628 DEM5C24.exe 2468 DEMB210.exe 1380 DEM879.exe 1976 DEM5EB3.exe 772 DEMAFDF.exe 2716 DEM56D.exe -
Loads dropped DLL 6 IoCs
pid Process 2092 c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe 2628 DEM5C24.exe 2468 DEMB210.exe 1380 DEM879.exe 1976 DEM5EB3.exe 772 DEMAFDF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2628 2092 c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe 29 PID 2092 wrote to memory of 2628 2092 c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe 29 PID 2092 wrote to memory of 2628 2092 c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe 29 PID 2092 wrote to memory of 2628 2092 c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe 29 PID 2628 wrote to memory of 2468 2628 DEM5C24.exe 33 PID 2628 wrote to memory of 2468 2628 DEM5C24.exe 33 PID 2628 wrote to memory of 2468 2628 DEM5C24.exe 33 PID 2628 wrote to memory of 2468 2628 DEM5C24.exe 33 PID 2468 wrote to memory of 1380 2468 DEMB210.exe 35 PID 2468 wrote to memory of 1380 2468 DEMB210.exe 35 PID 2468 wrote to memory of 1380 2468 DEMB210.exe 35 PID 2468 wrote to memory of 1380 2468 DEMB210.exe 35 PID 1380 wrote to memory of 1976 1380 DEM879.exe 37 PID 1380 wrote to memory of 1976 1380 DEM879.exe 37 PID 1380 wrote to memory of 1976 1380 DEM879.exe 37 PID 1380 wrote to memory of 1976 1380 DEM879.exe 37 PID 1976 wrote to memory of 772 1976 DEM5EB3.exe 39 PID 1976 wrote to memory of 772 1976 DEM5EB3.exe 39 PID 1976 wrote to memory of 772 1976 DEM5EB3.exe 39 PID 1976 wrote to memory of 772 1976 DEM5EB3.exe 39 PID 772 wrote to memory of 2716 772 DEMAFDF.exe 41 PID 772 wrote to memory of 2716 772 DEMAFDF.exe 41 PID 772 wrote to memory of 2716 772 DEMAFDF.exe 41 PID 772 wrote to memory of 2716 772 DEMAFDF.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c3205ba22e31f513db9f555cf4fd7f23_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\DEM5C24.exe"C:\Users\Admin\AppData\Local\Temp\DEM5C24.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\DEMB210.exe"C:\Users\Admin\AppData\Local\Temp\DEMB210.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\DEM879.exe"C:\Users\Admin\AppData\Local\Temp\DEM879.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\DEM5EB3.exe"C:\Users\Admin\AppData\Local\Temp\DEM5EB3.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\DEMAFDF.exe"C:\Users\Admin\AppData\Local\Temp\DEMAFDF.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\DEM56D.exe"C:\Users\Admin\AppData\Local\Temp\DEM56D.exe"7⤵
- Executes dropped EXE
PID:2716
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD590e185c49c40320c98037327c3939b08
SHA11f07010fd85235ac7d66499f11ca00bda075e3aa
SHA256062da0abd557283795730b220c8dab36fa429735f9fdbdf45612a1420b7e7576
SHA5123e56b56145b6ff63959f9c112f0956bd684e828636c6fd1938343281538dedcb4c7eb906db5cab527b61da259fc723cee968cf85716d4a4235ad6ce466c53eb1
-
Filesize
14KB
MD56521732d3bd8e911680f75dc69794ffa
SHA1469f819132309af2a529a9304b7dad2b1432a0d9
SHA256d6739ca947a41caafe7f2968447aa9f98c0239f24a384f26d565edf28af7e812
SHA512a675f97b107e07fe70e1e1e6e9b184b4d1f93c482e1d132e8a23e03628c80a2fdcc741c0970493f1046b843eab7b9ae6e9bae9f38e97a00c77df743043a01e2a
-
Filesize
14KB
MD597b9f19c6359f69fe4a9c46efe52260a
SHA17170c99770451180c944ad41223a13d6b9b28840
SHA256506052bedeb870f95288ac6852fe7ab72f10c0885cdc9b8cfc90cde486e13f8b
SHA51239d5b9e21cf6c4b8c4904aa8593bbe305a8321a764b3daf27e238894c30e79666a00dc84a0466a202efbb32de26e9cb371617dede6922d19c64256eef9380ec1
-
Filesize
14KB
MD53d4aa3b6cef48daf2962bab0667fe804
SHA18b01083cf10880fd6adc4978dfb9b21616c34703
SHA2560cc36cd12c195913074e98e40b95574ce6cb1ed57de80055fbc9e1474ed050c7
SHA512c44ceae8124f82757c42b76124a27eefb877eb1be4859228817bb86e9273a609a703035912063fa18ea89570841a8955d7025afc6653fe74ccdfccc6de863abc
-
Filesize
14KB
MD59f66f4c69486eae1f965c86f82c344f9
SHA16a17ab3293a9d945e8e530ebb080fff9004b786b
SHA256e522cc7a988e4d4eebbae32a333c2226292cbcd6ce4a0d29cbc559efe08ce746
SHA5120b9505f4c7099fa60b7c2b0d02de2ed92e0f938b12a15ff937449c373aec447b6cc22e6124c088c9a9aa167755ba0a07dc8a18d444024652c5fbdbd0bd3956c1
-
Filesize
14KB
MD596a8cef9af415c77581551c05a3e5117
SHA14ba9e20b4182574713fc79ec04c4a3dc49238d23
SHA256c36ceddcdf465de67c121306227d15e34e861284b7897024a1453a196002d634
SHA512abefddde1e42a83c5f01d1d97e3d3a2f8242ce62befeb4007680f0199a5d854db73c6e37eb1a792e631282f1b96fd8c53a06e761facd1522629a71321adcb86b