Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
f8d4c26af8b41108412d38cac0f5f0c7
-
SHA1
43312b4fa4b37dce79eb34b921c59c009321fb19
-
SHA256
5869bb5d7fa0d15adb7d2987c0ec21625443f58ce8fc9f8ed21d08866a3ffee5
-
SHA512
9178abb44ce60ffc3ca4835d016790f1bd74bac8da85a76a47bcbb70cbc0119937e8a1f61f718b470fb468c2b35efcfa215d54fb896be11894aeac81a9215f61
-
SSDEEP
98304:bvbnDNxb+poegJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk84doGAYJ7Km5b7j:zf+eJiPD3Nm7AJEgLYX8CNYzQEr0WO0v
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\ZXMKPYGI\hosts f8d4c26afGCFO.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 f8d4c26afGCFO.exe -
Loads dropped DLL 7 IoCs
pid Process 2876 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 2876 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2672 2600 WerFault.exe 28 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2568 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2600 f8d4c26afGCFO.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 f8d4c26afGCFO.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2600 2876 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 28 PID 2600 wrote to memory of 2624 2600 f8d4c26afGCFO.exe 29 PID 2600 wrote to memory of 2624 2600 f8d4c26afGCFO.exe 29 PID 2600 wrote to memory of 2624 2600 f8d4c26afGCFO.exe 29 PID 2600 wrote to memory of 2624 2600 f8d4c26afGCFO.exe 29 PID 2600 wrote to memory of 2672 2600 f8d4c26afGCFO.exe 31 PID 2600 wrote to memory of 2672 2600 f8d4c26afGCFO.exe 31 PID 2600 wrote to memory of 2672 2600 f8d4c26afGCFO.exe 31 PID 2600 wrote to memory of 2672 2600 f8d4c26afGCFO.exe 31 PID 2624 wrote to memory of 2568 2624 cmd.exe 32 PID 2624 wrote to memory of 2568 2624 cmd.exe 32 PID 2624 wrote to memory of 2568 2624 cmd.exe 32 PID 2624 wrote to memory of 2568 2624 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\f8d4c26afGCFO.exe-yue2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
PID:2568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 4723⤵
- Loads dropped DLL
- Program crash
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD59f55921cb554857ac2444deb6c3d0ea1
SHA1865141ec5e4b4a06b232cb2d9f57b747b1c19388
SHA2568fd4d5ae708baa37caa92a05c2e73c785310669dd2bdbd261ba053d20daf9431
SHA51232b9f51282624a3b418ab32b6724c4af74747e7066bd8a6202c96696755a371744a4df516c63ff06fd0e7f767fc72fff4af03685d58026971ee49c01479e9f4d