Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 19:36
Static task
static1
Behavioral task
behavioral1
Sample
f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe
-
Size
676KB
-
MD5
f89f25bb6d3e0dbc8e63118a4f512814
-
SHA1
04b0eb534c8ecd591dd2a8b0cdb62fe775eecab8
-
SHA256
cc2e079e8fec70fec1b52104725cdc35ff118da22487d7e4c0fbb91fbd10f5f7
-
SHA512
510f90026438636ccbfb9f735d91f06b14fe2bbc1effb031785f5821eec6435e9caa154649ee9848249adc470127ab9fdb869a86b27165264823c7e02a7ced7c
-
SSDEEP
12288:4f6tHCebR0tCyflokFUFp1AphvuErVFjORSAQ1C:XtXaYyfKkFUFp6zzrVR2SY
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 1456 XfireSpread.exe 2552 ri0t.exe 2808 taskmngr.exe 2228 taskmngr.exe 1956 taskmngr.exe 1860 taskmngr.exe 684 taskmngr.exe 2604 taskmngr.exe 1756 taskmngr.exe 2072 taskmngr.exe 1804 taskmngr.exe 2184 taskmngr.exe -
Loads dropped DLL 24 IoCs
pid Process 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 2552 ri0t.exe 2552 ri0t.exe 2808 taskmngr.exe 2808 taskmngr.exe 2228 taskmngr.exe 2228 taskmngr.exe 1956 taskmngr.exe 1956 taskmngr.exe 1860 taskmngr.exe 1860 taskmngr.exe 684 taskmngr.exe 684 taskmngr.exe 2604 taskmngr.exe 2604 taskmngr.exe 1756 taskmngr.exe 1756 taskmngr.exe 2072 taskmngr.exe 2072 taskmngr.exe 1804 taskmngr.exe 1804 taskmngr.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe ri0t.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe ri0t.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File created C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe File opened for modification C:\Windows\SysWOW64\taskmngr.exe taskmngr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1456 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 28 PID 1356 wrote to memory of 1456 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 28 PID 1356 wrote to memory of 1456 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 28 PID 1356 wrote to memory of 1456 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 28 PID 1356 wrote to memory of 2552 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 30 PID 1356 wrote to memory of 2552 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 30 PID 1356 wrote to memory of 2552 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 30 PID 1356 wrote to memory of 2552 1356 f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2808 2552 ri0t.exe 31 PID 2552 wrote to memory of 2808 2552 ri0t.exe 31 PID 2552 wrote to memory of 2808 2552 ri0t.exe 31 PID 2552 wrote to memory of 2808 2552 ri0t.exe 31 PID 2808 wrote to memory of 2228 2808 taskmngr.exe 32 PID 2808 wrote to memory of 2228 2808 taskmngr.exe 32 PID 2808 wrote to memory of 2228 2808 taskmngr.exe 32 PID 2808 wrote to memory of 2228 2808 taskmngr.exe 32 PID 2228 wrote to memory of 1956 2228 taskmngr.exe 33 PID 2228 wrote to memory of 1956 2228 taskmngr.exe 33 PID 2228 wrote to memory of 1956 2228 taskmngr.exe 33 PID 2228 wrote to memory of 1956 2228 taskmngr.exe 33 PID 1956 wrote to memory of 1860 1956 taskmngr.exe 36 PID 1956 wrote to memory of 1860 1956 taskmngr.exe 36 PID 1956 wrote to memory of 1860 1956 taskmngr.exe 36 PID 1956 wrote to memory of 1860 1956 taskmngr.exe 36 PID 1860 wrote to memory of 684 1860 taskmngr.exe 37 PID 1860 wrote to memory of 684 1860 taskmngr.exe 37 PID 1860 wrote to memory of 684 1860 taskmngr.exe 37 PID 1860 wrote to memory of 684 1860 taskmngr.exe 37 PID 684 wrote to memory of 2604 684 taskmngr.exe 38 PID 684 wrote to memory of 2604 684 taskmngr.exe 38 PID 684 wrote to memory of 2604 684 taskmngr.exe 38 PID 684 wrote to memory of 2604 684 taskmngr.exe 38 PID 2604 wrote to memory of 1756 2604 taskmngr.exe 39 PID 2604 wrote to memory of 1756 2604 taskmngr.exe 39 PID 2604 wrote to memory of 1756 2604 taskmngr.exe 39 PID 2604 wrote to memory of 1756 2604 taskmngr.exe 39 PID 1756 wrote to memory of 2072 1756 taskmngr.exe 40 PID 1756 wrote to memory of 2072 1756 taskmngr.exe 40 PID 1756 wrote to memory of 2072 1756 taskmngr.exe 40 PID 1756 wrote to memory of 2072 1756 taskmngr.exe 40 PID 2072 wrote to memory of 1804 2072 taskmngr.exe 41 PID 2072 wrote to memory of 1804 2072 taskmngr.exe 41 PID 2072 wrote to memory of 1804 2072 taskmngr.exe 41 PID 2072 wrote to memory of 1804 2072 taskmngr.exe 41 PID 1804 wrote to memory of 2184 1804 taskmngr.exe 42 PID 1804 wrote to memory of 2184 1804 taskmngr.exe 42 PID 1804 wrote to memory of 2184 1804 taskmngr.exe 42 PID 1804 wrote to memory of 2184 1804 taskmngr.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f89f25bb6d3e0dbc8e63118a4f512814_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\XfireSpread.exe"C:\Users\Admin\AppData\Local\Temp\XfireSpread.exe"2⤵
- Executes dropped EXE
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\ri0t.exe"C:\Users\Admin\AppData\Local\Temp\ri0t.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 488 "C:\Users\Admin\AppData\Local\Temp\ri0t.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 544 "C:\Windows\SysWOW64\taskmngr.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 528 "C:\Windows\SysWOW64\taskmngr.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 556 "C:\Windows\SysWOW64\taskmngr.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 536 "C:\Windows\SysWOW64\taskmngr.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 532 "C:\Windows\SysWOW64\taskmngr.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 548 "C:\Windows\SysWOW64\taskmngr.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 560 "C:\Windows\SysWOW64\taskmngr.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 540 "C:\Windows\SysWOW64\taskmngr.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\taskmngr.exeC:\Windows\system32\taskmngr.exe 568 "C:\Windows\SysWOW64\taskmngr.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2184
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fbd7035728bd9ee2da286949cd3a6d3f
SHA1c33065b225876332e3ca5aeda4094c3727ca2804
SHA2565245e610caf5da7aa9af1d089510e3ef96eb40bf49a2bf327c7ddf2fc4d6f8a8
SHA5123ba7a137249902f820077dbcf6bb19baf65b3a7a17853cf03ce12f776f885650f8967ec13bb390d628de3a31fef9be42b72d9446097ac4a13d6522cf866652da
-
Filesize
220KB
MD50fe319575a3c53eae13851cd310567ba
SHA1b218afac76c097620d6d6e06255519526400da03
SHA256d728bde25afd081c33a72a2879e0af45e1dc289dfc87720e221dde512de649e3
SHA512c3c2506c9a531d606cdf2f9b19c08082a1cc88b325487aaf83346d32722bbf0a31a99bc25186bd038fc3250781a94e86fe0ab782afffb7c988d9df6f3f87816d
-
Filesize
348KB
MD538d968abd419bdbd0f9d3137b6149a4c
SHA1f0699004834df6d8c816a3dbca908acfb4b68f7d
SHA2563e8b87cf337ac43f6e094680efd645fe631410d3960fd993d3d1f3b630659d7e
SHA512de264947a1103f67df1032ffb611ea3c13e75085d4046638bb52d410f36959ae03331ca5458e921f057a364ac0c5dbd120840ee45bef2322a76490bc15c0fc0f