Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 08:55
Behavioral task
behavioral1
Sample
e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe
-
Size
334KB
-
MD5
e99eec24eda1a60927fe3571cf809231
-
SHA1
b59e00498a3dba6ca160bc64df8b456832ccc7a7
-
SHA256
650d72343156a5a8d13cb47d3c018aae3dabd18aca278407b280069c56c59aa3
-
SHA512
e459fe2594d8e7ae284bb00079d444b58426fcaa22ac79437d22deeb2def0743e758c35b04c66fb8488c2231c76ecc39671c801198519a6426bb6d93135d7332
-
SSDEEP
6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kII4V41:QjkArEN249AyE/rbaMct4bO2/V/C1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1384 server.exe 2208 server.exe -
Loads dropped DLL 3 IoCs
pid Process 2824 e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe 2824 e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe 1384 server.exe -
resource yara_rule behavioral1/memory/2824-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2824-14-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2824-14-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1384 set thread context of 2208 1384 server.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 server.exe 2208 server.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1384 2824 e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe 28 PID 2824 wrote to memory of 1384 2824 e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe 28 PID 2824 wrote to memory of 1384 2824 e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe 28 PID 2824 wrote to memory of 1384 2824 e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe 28 PID 1384 wrote to memory of 2208 1384 server.exe 29 PID 1384 wrote to memory of 2208 1384 server.exe 29 PID 1384 wrote to memory of 2208 1384 server.exe 29 PID 1384 wrote to memory of 2208 1384 server.exe 29 PID 1384 wrote to memory of 2208 1384 server.exe 29 PID 1384 wrote to memory of 2208 1384 server.exe 29 PID 1384 wrote to memory of 2208 1384 server.exe 29 PID 2208 wrote to memory of 1092 2208 server.exe 18 PID 2208 wrote to memory of 1092 2208 server.exe 18 PID 2208 wrote to memory of 1092 2208 server.exe 18 PID 2208 wrote to memory of 1092 2208 server.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e99eec24eda1a60927fe3571cf809231_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp/server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\server.exe{:\Users\Admin\AppData\Local\Temp/server.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD52f78d097e2e9b8ac9fab35f453134409
SHA1bd4cbc1e25ba2331164f08d5c82df01b29461da2
SHA256b910c2f8fff06e095df084b36edbad509eb6437c40100c05d61282979b7b371c
SHA5127b31d55da2b611c28b0e1a8ce11df69d51d5edbc45837de19fc0e924a989bf1dbc1c986f8517709aaef28a422dda0837f31b7b6431ae77e6530b29280a269900