Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe
-
Size
263KB
-
MD5
f6f5eb2cc4d9e875991b3c56bdfd3366
-
SHA1
ff02aa218d38dacf961c4b924686bc95225056f3
-
SHA256
e13e87b98f0a1e4c7e6c69f2bc8a5ed065fca7151dc77894de0ba8d2b8cb35f2
-
SHA512
a8380b67b0afe40a4c7511f8e0a0d528f8c1d900d29b5eb7c3dd09dcbfb0acdf2e7106283ae0d160e9402d0c4ada89f077129605ecb150be8a5ebda5f4803577
-
SSDEEP
3072:sfYcityDzpeTNPF77mnVKtW4728yQZ1kGnCek3AniTtj1j649:Sr+EFeTNPxmVKtWsyO19k3eipJj64
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2868 msa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe File created C:\Windows\msa.exe f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe File opened for modification C:\Windows\msa.exe f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job msa.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job msa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International msa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe 2868 msa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2868 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2868 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2868 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2868 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2868 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2868 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2868 2804 f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6f5eb2cc4d9e875991b3c56bdfd3366_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\msa.exeC:\Windows\msa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD539bee6ae1862c06b91f7f6e784d4181c
SHA1dfdb07cd600b3fea03627fda3639be705bdae2d6
SHA256c105ababb2ebc63f320923aa713fc8773bb654e572d3f0dd2d50957f15b007c3
SHA512a89132ec42761817286e5c9445a08b5a5ab3af7cb054300e61a3b2c01da13271fb5337a76815417b765e44b98e1f8a81ac50239781a68ff9c10bf3c67138973e
-
Filesize
263KB
MD5f6f5eb2cc4d9e875991b3c56bdfd3366
SHA1ff02aa218d38dacf961c4b924686bc95225056f3
SHA256e13e87b98f0a1e4c7e6c69f2bc8a5ed065fca7151dc77894de0ba8d2b8cb35f2
SHA512a8380b67b0afe40a4c7511f8e0a0d528f8c1d900d29b5eb7c3dd09dcbfb0acdf2e7106283ae0d160e9402d0c4ada89f077129605ecb150be8a5ebda5f4803577