Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe
-
Size
208KB
-
MD5
fc81235e35bc93e91cd97ec890c02b74
-
SHA1
b12a844774261070d3123de14371afe1588c74f2
-
SHA256
80e70808c8138bd4c11cb151e3ac1e35e550c545d7670206499da8e8b0f6a953
-
SHA512
c3bfaae2c669143275d48d2b1d02565a6341be254e5dd5614d0882cb6084fbc6d95e3a12c46def8b00a2c3beb807b912694e96a9449d10ce92815c0d2693235e
-
SSDEEP
6144:hl4mjZF//MrI3L0SksjkIwUc7zJ66cgDKgr8wVcmzt:Zr//eMkhIwUc70mD/Bcmz
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3012 u.dll 2420 u.dll 1888 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2516 cmd.exe 2516 cmd.exe 2516 cmd.exe 2516 cmd.exe 2420 u.dll 2420 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2516 2156 fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2516 2156 fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2516 2156 fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe 29 PID 2156 wrote to memory of 2516 2156 fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe 29 PID 2516 wrote to memory of 3012 2516 cmd.exe 30 PID 2516 wrote to memory of 3012 2516 cmd.exe 30 PID 2516 wrote to memory of 3012 2516 cmd.exe 30 PID 2516 wrote to memory of 3012 2516 cmd.exe 30 PID 2516 wrote to memory of 2420 2516 cmd.exe 31 PID 2516 wrote to memory of 2420 2516 cmd.exe 31 PID 2516 wrote to memory of 2420 2516 cmd.exe 31 PID 2516 wrote to memory of 2420 2516 cmd.exe 31 PID 2420 wrote to memory of 1888 2420 u.dll 32 PID 2420 wrote to memory of 1888 2420 u.dll 32 PID 2420 wrote to memory of 1888 2420 u.dll 32 PID 2420 wrote to memory of 1888 2420 u.dll 32 PID 2516 wrote to memory of 1512 2516 cmd.exe 33 PID 2516 wrote to memory of 1512 2516 cmd.exe 33 PID 2516 wrote to memory of 1512 2516 cmd.exe 33 PID 2516 wrote to memory of 1512 2516 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2414.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save fc81235e35bc93e91cd97ec890c02b74_JaffaCakes118.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\3F9F.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\3F9F.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe3FA0.tmp"4⤵
- Executes dropped EXE
PID:1888
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:1512
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f9d41dcc7d7787236d2686e50750b32
SHA117ec9a93fed688a6529fb857c22f619e6cf45f5f
SHA256472e148396788a4b678d4c7ed237e7c5577ad4758c9fee990bdbeb36f802232c
SHA5120cdace403fb99c76ab8c73c349e61f4cb6c155cf43bd7d528e6d6b200fdea5a7c55cf302edd817244b1054b5f0cac486722a367766ed7cc3cccf4abd86ea8d38
-
Filesize
41KB
MD59cdcf02f847ddde1f3b62c676c5cc737
SHA11e28bc7716cb6adb55b1b397dbabbe31adba3cf2
SHA256d7726cc05bcd788912a23fc85f233775da28cb0d4d2920c2be66e5cc69e2b7ae
SHA512438303dceafa36ac40271d6b7759248357109cc479a53dd4eb472ab35d51f333f629be2da54fc113bcdcf2bb4bdf4201b5075351842d20d7e818c80a31b88e92
-
Filesize
24KB
MD5eb5c17e4c5dea19267f445fef0699c13
SHA1e651b2abf62d10687c704b49416ad91d5fcaeb87
SHA256f53b5c0c5d0b67cdcaf2139d550b035de003d94a86a80a9d77bb70100e3e7e0c
SHA512505ac3d12c48234ed1fd72fa3bc75f27cda923dc89666552ac1de8f17e51d8473c315ba7ec682fd703e17cbe81bb3d7d04485839d0a0481c96a4db1fd07eebf0
-
Filesize
41KB
MD59f3c888dc0e59c4e7c309dc01b189a11
SHA14ca0128bafb094f389d3c6eb806a5f2e13e1ea42
SHA2566354ef941e5047eb0abdb509bc47b2d10030bf0b1b722cc99b44274b22701e36
SHA51244486f8a61310a636b3a0eccbc31c66e106a4bc8f8342526c2e02a45ec5ef130ea4420d7bc8c09fcd5372b451aad9a8af5eb23a9b47c9d19c14e58e14b98de64
-
Filesize
700KB
MD5ac3e2f16df5b8e004bc7528957957c95
SHA1318dfb96abdc8e9d3778788dfdbb1f3dba885fba
SHA256c53ac431faed8f5ab7c67b254f913efe0dceaafdbf26b02b930d07f45d840fe2
SHA5124c60d3b255c38807a104e4362493dbf651fb8893633e94ee9a4c69770773f8d7bf95d310051154b9bd74d6eb1993626a5eb107e74e891d681f0398c64a7ebaf4
-
Filesize
1KB
MD57d835ca670a67d265dfc3109269b5d39
SHA16c6de3dcace396aa12e7fa1bc316ed3f108e34f2
SHA256dadc386394b7609e551df7be525a868b388c0585f6ef705978fb1965a9e1bc21
SHA51218d88a08944a68bd1831874a18b10de4fff3c5c023a802afa227093a647d176e2af4c37736ceb6ce5193516e6f2d831423de1481344fd89b28e0e1a8bc3e0e91
-
Filesize
1KB
MD57da0d3e8b1c96ae9584bf3f96d423b89
SHA1a65201b24e3b2be09830fe1d99c40c08a646df57
SHA256508d56e401c31136dcb9fde56ec77e88912a7fa5711be364f65742c54f90f3d2
SHA512d39842487ade31e7bd350222c37f657a0b194ad69c680e45d69a98a875c67f90b43031c3302804738e2bb8f56585b563929872455fbbdd10bdcb89f35ae68773
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e