Analysis
-
max time kernel
154s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe
-
Size
190KB
-
MD5
f982412c1068c62c74e66e33d22f126c
-
SHA1
2abac49c1945c84afbf043294caedb466ecc9a6c
-
SHA256
8f0de9561c819a2ac7f490afebea87ac5a80fdc6af0877210e3601ad89de8310
-
SHA512
54afecfa208207f1605382fdbb907e4f0f58d30fb7a749cf91a5a31ec23ff7968ca85cf17543f06c57e0b683c6274c8ebb224d1f72df6d1b0dc52a0543b44a6e
-
SSDEEP
3072:mnb3hr6gHOACLkhR8xD/5TaBOR5OE1EM2jASY1atZgn37zpnop2WtXvs3R:o3hr6gH3N4xD/lay92NgvpnoJtEh
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
Processes:
SVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXEpid process 3996 SVCHOSTI.EXE 1980 SVCHOSTI.EXE 4512 SVCHOSTI.EXE 2604 SVCHOSTI.EXE 4932 SVCHOSTI.EXE 3412 SVCHOSTI.EXE 2144 SVCHOSTI.EXE 1504 SVCHOSTI.EXE 5080 SVCHOSTI.EXE 3728 SVCHOSTI.EXE -
Drops file in System32 directory 22 IoCs
Processes:
SVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXEf982412c1068c62c74e66e33d22f126c_JaffaCakes118.exeSVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXEdescription ioc process File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File created C:\Windows\SysWOW64\SVCHOSTI.EXE f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSTI.EXE SVCHOSTI.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exeSVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXESVCHOSTI.EXEdescription pid process target process PID 1092 wrote to memory of 3996 1092 f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe SVCHOSTI.EXE PID 1092 wrote to memory of 3996 1092 f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe SVCHOSTI.EXE PID 1092 wrote to memory of 3996 1092 f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe SVCHOSTI.EXE PID 3996 wrote to memory of 1980 3996 SVCHOSTI.EXE SVCHOSTI.EXE PID 3996 wrote to memory of 1980 3996 SVCHOSTI.EXE SVCHOSTI.EXE PID 3996 wrote to memory of 1980 3996 SVCHOSTI.EXE SVCHOSTI.EXE PID 1980 wrote to memory of 4512 1980 SVCHOSTI.EXE SVCHOSTI.EXE PID 1980 wrote to memory of 4512 1980 SVCHOSTI.EXE SVCHOSTI.EXE PID 1980 wrote to memory of 4512 1980 SVCHOSTI.EXE SVCHOSTI.EXE PID 4512 wrote to memory of 2604 4512 SVCHOSTI.EXE SVCHOSTI.EXE PID 4512 wrote to memory of 2604 4512 SVCHOSTI.EXE SVCHOSTI.EXE PID 4512 wrote to memory of 2604 4512 SVCHOSTI.EXE SVCHOSTI.EXE PID 2604 wrote to memory of 4932 2604 SVCHOSTI.EXE SVCHOSTI.EXE PID 2604 wrote to memory of 4932 2604 SVCHOSTI.EXE SVCHOSTI.EXE PID 2604 wrote to memory of 4932 2604 SVCHOSTI.EXE SVCHOSTI.EXE PID 4932 wrote to memory of 3412 4932 SVCHOSTI.EXE SVCHOSTI.EXE PID 4932 wrote to memory of 3412 4932 SVCHOSTI.EXE SVCHOSTI.EXE PID 4932 wrote to memory of 3412 4932 SVCHOSTI.EXE SVCHOSTI.EXE PID 3412 wrote to memory of 2144 3412 SVCHOSTI.EXE SVCHOSTI.EXE PID 3412 wrote to memory of 2144 3412 SVCHOSTI.EXE SVCHOSTI.EXE PID 3412 wrote to memory of 2144 3412 SVCHOSTI.EXE SVCHOSTI.EXE PID 2144 wrote to memory of 1504 2144 SVCHOSTI.EXE SVCHOSTI.EXE PID 2144 wrote to memory of 1504 2144 SVCHOSTI.EXE SVCHOSTI.EXE PID 2144 wrote to memory of 1504 2144 SVCHOSTI.EXE SVCHOSTI.EXE PID 1504 wrote to memory of 5080 1504 SVCHOSTI.EXE SVCHOSTI.EXE PID 1504 wrote to memory of 5080 1504 SVCHOSTI.EXE SVCHOSTI.EXE PID 1504 wrote to memory of 5080 1504 SVCHOSTI.EXE SVCHOSTI.EXE PID 5080 wrote to memory of 3728 5080 SVCHOSTI.EXE SVCHOSTI.EXE PID 5080 wrote to memory of 3728 5080 SVCHOSTI.EXE SVCHOSTI.EXE PID 5080 wrote to memory of 3728 5080 SVCHOSTI.EXE SVCHOSTI.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1228 "C:\Users\Admin\AppData\Local\Temp\f982412c1068c62c74e66e33d22f126c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1188 "C:\Windows\SysWOW64\SVCHOSTI.EXE"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1160 "C:\Windows\SysWOW64\SVCHOSTI.EXE"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1120 "C:\Windows\SysWOW64\SVCHOSTI.EXE"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1164 "C:\Windows\SysWOW64\SVCHOSTI.EXE"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1152 "C:\Windows\SysWOW64\SVCHOSTI.EXE"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1172 "C:\Windows\SysWOW64\SVCHOSTI.EXE"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1028 "C:\Windows\SysWOW64\SVCHOSTI.EXE"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1184 "C:\Windows\SysWOW64\SVCHOSTI.EXE"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\SVCHOSTI.EXEC:\Windows\system32\SVCHOSTI.EXE 1180 "C:\Windows\SysWOW64\SVCHOSTI.EXE"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3728
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD5f982412c1068c62c74e66e33d22f126c
SHA12abac49c1945c84afbf043294caedb466ecc9a6c
SHA2568f0de9561c819a2ac7f490afebea87ac5a80fdc6af0877210e3601ad89de8310
SHA51254afecfa208207f1605382fdbb907e4f0f58d30fb7a749cf91a5a31ec23ff7968ca85cf17543f06c57e0b683c6274c8ebb224d1f72df6d1b0dc52a0543b44a6e