Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe
-
Size
264KB
-
MD5
ff56fe5666997d26f95a8db7068e0079
-
SHA1
308466709bf45c1c4211656958aa343435286aab
-
SHA256
8905ed9a1de99b7e5451a80654d7c8161c845a6b914532f03bb7a484c01d632d
-
SHA512
4203dff75caed0e1bc8008e6175cbfcdedd8e1c1eaf47db4216d57a879b619e2a7ea60da5cab64176e534bfb53074bc1e3666f7f7aaa6eec692a21b882035400
-
SSDEEP
3072:uFCUs5/OfdffBoK/PyP3dOh/z51HUvtw2tpNskX+ZcBqkDGvtABJhqSAQL+NmPWl:5Ol5pPyV+/Vsw2tpNs7ZcZKwqjQLoj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1212 ~imsinst.exe 2636 zLoader.exe -
Loads dropped DLL 4 IoCs
pid Process 2792 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 2792 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 1212 ~imsinst.exe 1212 ~imsinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1212 2792 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 28 PID 2792 wrote to memory of 1212 2792 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 28 PID 2792 wrote to memory of 1212 2792 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 28 PID 2792 wrote to memory of 1212 2792 ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe 28 PID 1212 wrote to memory of 2636 1212 ~imsinst.exe 29 PID 1212 wrote to memory of 2636 1212 ~imsinst.exe 29 PID 1212 wrote to memory of 2636 1212 ~imsinst.exe 29 PID 1212 wrote to memory of 2636 1212 ~imsinst.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\~imsinst.exe"C:\Users\Admin\AppData\Local\Temp\~imsinst.exe" C:\Users\Admin\AppData\Local\Temp\ff56fe5666997d26f95a8db7068e0079_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\zLoader.exe"C:\Users\Admin\AppData\Local\Temp\zLoader.exe"3⤵
- Executes dropped EXE
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5ea0a991d31ff4c264f175e53cd983ab8
SHA123f6222b84d04b32b7907620a0a410ae181da336
SHA2567489cc75c022b7a77e009a601fb5344e75d12b821faeb7c9cb1d47799d78aa20
SHA512f9a76a65995f1050718d17476ff455e5dd7a248977d67bb84559f4a539381d744d075017d82d92cd18cacd2b7c1992b49b8c84867823d0bb7d3dd0da653c929d
-
Filesize
264KB
MD5ff56fe5666997d26f95a8db7068e0079
SHA1308466709bf45c1c4211656958aa343435286aab
SHA2568905ed9a1de99b7e5451a80654d7c8161c845a6b914532f03bb7a484c01d632d
SHA5124203dff75caed0e1bc8008e6175cbfcdedd8e1c1eaf47db4216d57a879b619e2a7ea60da5cab64176e534bfb53074bc1e3666f7f7aaa6eec692a21b882035400