Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe
-
Size
87KB
-
MD5
e88af867b887ddb0f9f015703c22978b
-
SHA1
4405c848e3a8fe580b1999020be7187d955bf34c
-
SHA256
d22bf423ab2a1e744981284fe18386e6297e73160c148ec9e54aec312a057518
-
SHA512
0584dcb2a531d32f5ea37a9309cdac91cc2a31233ef8d72d7fab25b65e147be57d19353b007d7432adbc528bd55eb9287e076180783a73b267230d9f3f647b43
-
SSDEEP
1536:MefxiVBfEgtlhVy4rI9VvcE0QhqCuBvIte8N0/T:ydx1IVsQhq1o/8T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1164 TempServices.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe 2032 e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1164 TempServices.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2032 e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1164 2032 e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe 28 PID 2032 wrote to memory of 1164 2032 e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe 28 PID 2032 wrote to memory of 1164 2032 e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe 28 PID 2032 wrote to memory of 1164 2032 e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe 28 PID 1164 wrote to memory of 1392 1164 TempServices.exe 21 PID 1164 wrote to memory of 1392 1164 TempServices.exe 21 PID 1164 wrote to memory of 1392 1164 TempServices.exe 21 PID 1164 wrote to memory of 1392 1164 TempServices.exe 21 PID 1164 wrote to memory of 1392 1164 TempServices.exe 21 PID 1164 wrote to memory of 1392 1164 TempServices.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e88af867b887ddb0f9f015703c22978b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\TempServices.exe"C:\Users\Admin\AppData\Local\TempServices.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD571646b1ce7827dcdd01bc08352688e95
SHA16036d6b8910ad1819fdbe8d16e0ababbad6c95ec
SHA256102fe984525b7fb9c7f1d9e88d56e6b00dd165d93acabcbb73631292cc720670
SHA5125e9bf3f4761f82cd76bcbc29ebf31b300cb24cfcd48e320e9f2d448907cd07acc3c69c554d1ecceb8c892fcc3a71b45ecddefea0865ca81e49b89a6815481055