Analysis
-
max time kernel
126s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 21:26
Behavioral task
behavioral1
Sample
fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe
-
Size
9KB
-
MD5
fdaf04c938e7423bf660a5e21f0dbf02
-
SHA1
aab508223b071240da01da21b34e710c94011d9e
-
SHA256
7a9416217094766b3f4295e342fc8e4d6a9f3dda330615812cc0e47088182ed3
-
SHA512
e1da95dc85b317bf4630a63ec6fae1ae661d6b53700ed27b1db4c66d75b17f416be9ac3b435096278314ebe0fb38e47a0555fc1755b96509c3f847ad28bd15a5
-
SSDEEP
192:Umng7XOzt9xzdDNXUzgtZFSbVcThxVysmr3Dj:S7X8tzdFUM85ah/5wj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1240 cmd.exe -
resource yara_rule behavioral1/memory/2012-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2012-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2100 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 28 PID 2012 wrote to memory of 2100 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 28 PID 2012 wrote to memory of 2100 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 28 PID 2012 wrote to memory of 2100 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 28 PID 2012 wrote to memory of 1240 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 32 PID 2012 wrote to memory of 1240 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 32 PID 2012 wrote to memory of 1240 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 32 PID 2012 wrote to memory of 1240 2012 fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdaf04c938e7423bf660a5e21f0dbf02_JaffaCakes118.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:2100
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵
- Deletes itself
PID:1240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD53c14c5e3c06cee94403ed2fea2fce3d8
SHA18c06df5d0f465e74d54a875d1d638788f9117768
SHA256ceb8648a10bfd570dff2e6972cb8483856eff345d16b1439631d59b077cc4130
SHA51237226bb9f155c8d2a4ca660e4844101bb5cba39b4e3932e623146cec964740361564e280df0593e54950de4c1c98c6ff8aa8e22919f2dd4b33b89d21cf324141