Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 13:38
Behavioral task
behavioral1
Sample
0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe
-
Size
994KB
-
MD5
0beedf0af80e94f5302f607cb2f6975d
-
SHA1
d057098b5cfdf7317f81a5049e4996fdb038c2cf
-
SHA256
9af7a38f538f74cda293228f4a82897eda192ba2218f14e528d01aa434eb8ca0
-
SHA512
3d09cf6d22d3c80f7a1dd67649278029151eca8b5632fe99d1fce3f8f0b1bf4e085a7895c30f23368511aa71ece354e778d941ba2fd9a9875aef4bd21f72f6f6
-
SSDEEP
24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxG:dJ5gEKNikf3hBfUiWxG
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000012120-5.dat family_ammyyadmin -
Executes dropped EXE 1 IoCs
pid Process 2968 budha.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2968 2372 0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe 28 PID 2372 wrote to memory of 2968 2372 0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe 28 PID 2372 wrote to memory of 2968 2372 0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe 28 PID 2372 wrote to memory of 2968 2372 0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0beedf0af80e94f5302f607cb2f6975d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD5e871af4e2a464731760b2e012874a263
SHA19211e2ac2a127c2339a0bee10f16968d6b9c9b51
SHA256622a7b25f3d8d11c859de0680e5db6029ad6d97bd37bd22643b0e386a2dc59d5
SHA51254116428de831a2251d7bd73f98bdca645546f9668a763b5cfc8f982f784139896713846c885ec45f346468746be7989c1e0df5714fcf15aa99da396aa71d187