Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe
-
Size
572KB
-
MD5
fcbebd2602f00dbdf81c408988c0c594
-
SHA1
cdfd36becd8a87f5b27c12dc1011d24c6f6503e4
-
SHA256
f9de9bf88e98a4ca36f4935f9d0656ed6185eebf2fa5eb2673e3e2acfa541223
-
SHA512
a94565342d2ba711332a12c412a20eade9a29bc3843d1568e0b4d697f5364ce3a79ce57db41a8212f5e1adf134426c8b4cf016ae879cae130bfdd69c4d869a8d
-
SSDEEP
12288:Hzwg73Zm3mn6K++ygPVVkGkCGEJuQRCcl9poIGe:T+3m6K++yyVapJBAFG
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2596 svchosv.exe 1660 svchosv.exe 1520 svchosv.exe 1664 svchosv.exe 2012 svchosv.exe 2140 svchosv.exe 3048 svchosv.exe 1600 svchosv.exe 2484 svchosv.exe 1676 svchosv.exe -
Loads dropped DLL 20 IoCs
pid Process 2948 fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe 2948 fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe 2596 svchosv.exe 2596 svchosv.exe 1660 svchosv.exe 1660 svchosv.exe 1520 svchosv.exe 1520 svchosv.exe 1664 svchosv.exe 1664 svchosv.exe 2012 svchosv.exe 2012 svchosv.exe 2140 svchosv.exe 2140 svchosv.exe 3048 svchosv.exe 3048 svchosv.exe 1600 svchosv.exe 1600 svchosv.exe 2484 svchosv.exe 2484 svchosv.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe svchosv.exe File created C:\Windows\SysWOW64\svchosv.exe fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svchosv.exe fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchosv.exe svchosv.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2948 fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe 2596 svchosv.exe 1660 svchosv.exe 1520 svchosv.exe 1664 svchosv.exe 2012 svchosv.exe 2140 svchosv.exe 3048 svchosv.exe 1600 svchosv.exe 2484 svchosv.exe 1676 svchosv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2596 2948 fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe 28 PID 2948 wrote to memory of 2596 2948 fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe 28 PID 2948 wrote to memory of 2596 2948 fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe 28 PID 2948 wrote to memory of 2596 2948 fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe 28 PID 2596 wrote to memory of 1660 2596 svchosv.exe 29 PID 2596 wrote to memory of 1660 2596 svchosv.exe 29 PID 2596 wrote to memory of 1660 2596 svchosv.exe 29 PID 2596 wrote to memory of 1660 2596 svchosv.exe 29 PID 1660 wrote to memory of 1520 1660 svchosv.exe 30 PID 1660 wrote to memory of 1520 1660 svchosv.exe 30 PID 1660 wrote to memory of 1520 1660 svchosv.exe 30 PID 1660 wrote to memory of 1520 1660 svchosv.exe 30 PID 1520 wrote to memory of 1664 1520 svchosv.exe 31 PID 1520 wrote to memory of 1664 1520 svchosv.exe 31 PID 1520 wrote to memory of 1664 1520 svchosv.exe 31 PID 1520 wrote to memory of 1664 1520 svchosv.exe 31 PID 1664 wrote to memory of 2012 1664 svchosv.exe 34 PID 1664 wrote to memory of 2012 1664 svchosv.exe 34 PID 1664 wrote to memory of 2012 1664 svchosv.exe 34 PID 1664 wrote to memory of 2012 1664 svchosv.exe 34 PID 2012 wrote to memory of 2140 2012 svchosv.exe 35 PID 2012 wrote to memory of 2140 2012 svchosv.exe 35 PID 2012 wrote to memory of 2140 2012 svchosv.exe 35 PID 2012 wrote to memory of 2140 2012 svchosv.exe 35 PID 2140 wrote to memory of 3048 2140 svchosv.exe 36 PID 2140 wrote to memory of 3048 2140 svchosv.exe 36 PID 2140 wrote to memory of 3048 2140 svchosv.exe 36 PID 2140 wrote to memory of 3048 2140 svchosv.exe 36 PID 3048 wrote to memory of 1600 3048 svchosv.exe 37 PID 3048 wrote to memory of 1600 3048 svchosv.exe 37 PID 3048 wrote to memory of 1600 3048 svchosv.exe 37 PID 3048 wrote to memory of 1600 3048 svchosv.exe 37 PID 1600 wrote to memory of 2484 1600 svchosv.exe 38 PID 1600 wrote to memory of 2484 1600 svchosv.exe 38 PID 1600 wrote to memory of 2484 1600 svchosv.exe 38 PID 1600 wrote to memory of 2484 1600 svchosv.exe 38 PID 2484 wrote to memory of 1676 2484 svchosv.exe 39 PID 2484 wrote to memory of 1676 2484 svchosv.exe 39 PID 2484 wrote to memory of 1676 2484 svchosv.exe 39 PID 2484 wrote to memory of 1676 2484 svchosv.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 704 "C:\Users\Admin\AppData\Local\Temp\fcbebd2602f00dbdf81c408988c0c594_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 712 "C:\Windows\SysWOW64\svchosv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 708 "C:\Windows\SysWOW64\svchosv.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 724 "C:\Windows\SysWOW64\svchosv.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 720 "C:\Windows\SysWOW64\svchosv.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 728 "C:\Windows\SysWOW64\svchosv.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 732 "C:\Windows\SysWOW64\svchosv.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 736 "C:\Windows\SysWOW64\svchosv.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 716 "C:\Windows\SysWOW64\svchosv.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\svchosv.exeC:\Windows\system32\svchosv.exe 744 "C:\Windows\SysWOW64\svchosv.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD5fcbebd2602f00dbdf81c408988c0c594
SHA1cdfd36becd8a87f5b27c12dc1011d24c6f6503e4
SHA256f9de9bf88e98a4ca36f4935f9d0656ed6185eebf2fa5eb2673e3e2acfa541223
SHA512a94565342d2ba711332a12c412a20eade9a29bc3843d1568e0b4d697f5364ce3a79ce57db41a8212f5e1adf134426c8b4cf016ae879cae130bfdd69c4d869a8d