Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe
-
Size
20KB
-
MD5
ec695b94d7b312233fd6420ea5ea6552
-
SHA1
27c93452ded149b2a5f528ba325ef6e9a7178a68
-
SHA256
1f01918a8a4f6e89e60ab22fde9e41ca595965b8c276b598462cb11c8c72fa0c
-
SHA512
52153252f7cef83ff1307acf79e272d505463855a0bbfe42744e18931954d6f2375e9eaf053cbbd3784643c03db27f74aa6175899eaef044d19dc96d22f5ec1a
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMx+L4Pn:hDXWipuE+K3/SSHgxmHZPn
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2168 DEMC40.exe 2656 DEM620D.exe 2200 DEMB75D.exe 2496 DEMCBD.exe 340 DEM622D.exe 1984 DEMB7AB.exe -
Loads dropped DLL 6 IoCs
pid Process 1652 ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe 2168 DEMC40.exe 2656 DEM620D.exe 2200 DEMB75D.exe 2496 DEMCBD.exe 340 DEM622D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2168 1652 ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe 29 PID 1652 wrote to memory of 2168 1652 ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe 29 PID 1652 wrote to memory of 2168 1652 ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe 29 PID 1652 wrote to memory of 2168 1652 ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe 29 PID 2168 wrote to memory of 2656 2168 DEMC40.exe 31 PID 2168 wrote to memory of 2656 2168 DEMC40.exe 31 PID 2168 wrote to memory of 2656 2168 DEMC40.exe 31 PID 2168 wrote to memory of 2656 2168 DEMC40.exe 31 PID 2656 wrote to memory of 2200 2656 DEM620D.exe 35 PID 2656 wrote to memory of 2200 2656 DEM620D.exe 35 PID 2656 wrote to memory of 2200 2656 DEM620D.exe 35 PID 2656 wrote to memory of 2200 2656 DEM620D.exe 35 PID 2200 wrote to memory of 2496 2200 DEMB75D.exe 37 PID 2200 wrote to memory of 2496 2200 DEMB75D.exe 37 PID 2200 wrote to memory of 2496 2200 DEMB75D.exe 37 PID 2200 wrote to memory of 2496 2200 DEMB75D.exe 37 PID 2496 wrote to memory of 340 2496 DEMCBD.exe 39 PID 2496 wrote to memory of 340 2496 DEMCBD.exe 39 PID 2496 wrote to memory of 340 2496 DEMCBD.exe 39 PID 2496 wrote to memory of 340 2496 DEMCBD.exe 39 PID 340 wrote to memory of 1984 340 DEM622D.exe 41 PID 340 wrote to memory of 1984 340 DEM622D.exe 41 PID 340 wrote to memory of 1984 340 DEM622D.exe 41 PID 340 wrote to memory of 1984 340 DEM622D.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec695b94d7b312233fd6420ea5ea6552_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\DEMC40.exe"C:\Users\Admin\AppData\Local\Temp\DEMC40.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\DEM620D.exe"C:\Users\Admin\AppData\Local\Temp\DEM620D.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\DEMB75D.exe"C:\Users\Admin\AppData\Local\Temp\DEMB75D.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\DEMCBD.exe"C:\Users\Admin\AppData\Local\Temp\DEMCBD.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\DEM622D.exe"C:\Users\Admin\AppData\Local\Temp\DEM622D.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\DEMB7AB.exe"C:\Users\Admin\AppData\Local\Temp\DEMB7AB.exe"7⤵
- Executes dropped EXE
PID:1984
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD523252203db81f3f4a4fa7b094d24bf0f
SHA19aad0db3f16cef8abb637e031a2d8b3ebc661d6f
SHA2562402482d67cf0ca4ad31f54c288ac8e8ae8a35a3a185143c42b5eff5fdd0f381
SHA51235d5c5215f746350631fc123a28558d4af3f40095d93dcfa5b0109ebb842bb1d81096748e402d27b22ed87ca46d3ceb7c5bfa9d7d63c244d775f39556a2e9a6d
-
Filesize
20KB
MD50ae0adbad70aa755036086e5f85301b5
SHA126c6efb80ae4ecd94cbcdf3122578ffeb0ce02bf
SHA25641848c791e9d472fefceb677b65daa57bafa9465f234b4b1c4edc89d0a0a0f67
SHA51225e821b4b656aba3da46d9332034b11fd57fbdbf1541d5e61dca22fcffa0b3a80486ca642548de07f63b71727c4386bda78c9ffc154a1d4799e8d0d8ea4833c9
-
Filesize
20KB
MD514c746d4d2451c22ff2f40868c87a078
SHA130ed3ea3c3511b21735b236f971b2a66cb69d562
SHA25696902b55c87f4555adeea6b64b444d476b47bc70dbbd444ebbeddb28b2cc3d31
SHA512145c5ec6c6b81c1fbee38e0a9d9cd7bd62f45db292d61e404fa3483e1ba02dbcf3ae57e4054d5ee7b6947a5623f2bb7fa2d903c6be59d695f3db7f15c56feac0
-
Filesize
20KB
MD51dd554ca43a2bbf9f79c00208e407513
SHA168e0d185906ebf451f8e41749c256e443f15986a
SHA25654703c76da00da41e2247dece0ce3face0c4d0943d5e8b62ec66796001ba1b51
SHA5124ca3ceaa2a2d5af1930ee9f6b975e81be5fbdb4a952eaa5dd126b5dce462ef9e2589b3dd5ee62d99ad3b7def1a07078489e3a756e4d341241625bb8044f364f7
-
Filesize
20KB
MD5ad5c947b6fdff01b3734ff979239ff2d
SHA1c540fd20b0755fa0b2f37d71b297a97115788467
SHA25626f3855bff375555da93673796710bf06e7372b1ecad5866d3ce5d0c4e0ce9d2
SHA5125f97167943670f7164f7a6604006be7ee368e7579e65fb3ab4cbd9273df2ea9aa7efc0fbc9902e97e9d36ba40faf73fda0008129805afb8084fe2b7ebc35f8e6
-
Filesize
20KB
MD5198f1e9da3e41f8626a7e26b8db02d11
SHA12fe452fd2b278f2a6f2eb85ca5553c54664bfc45
SHA2567aa6ca5e9ff752eb0c918d84b6a45e61dccf4931c243da44af85a0edd666c3fc
SHA512b0e7697082fc8c0b6a3f47dd842e4eba70f2400ddd19ee5e7699e574e3942acce536dca573dd0fac4cdf656b9b34d219087ef80331980de8f3dbdeb96d24501c