Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe
-
Size
600KB
-
MD5
11bc61071af789ba85c6fc3661dd6b8d
-
SHA1
2a080fabc7b2da3fec8b189dbb375949d3cb334b
-
SHA256
f02855ac22e67f1ad9d4c001c86bdfc62f892a5895dac27cdeff02153853396f
-
SHA512
1e92e686b756ca1e1cae1b461765b8b2102e723cdd7a20ad668e053c5fcb3a177c83f950a082750712df41347bce503bdaa33738f66508bd75840ebe2c17aff3
-
SSDEEP
12288:+qlRw5IyPaV1qvXhTDdyayL4NQ/BBXRGJl7TXtaWwyITXf30ebIQ:+gvV1IhALVBBXReobTXftbIQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 api.ipify.org 33 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Program crash 22 IoCs
pid pid_target Process procid_target 4992 2864 WerFault.exe 83 2912 2864 WerFault.exe 83 3476 2864 WerFault.exe 83 2968 2864 WerFault.exe 83 4816 2864 WerFault.exe 83 3976 2864 WerFault.exe 83 3516 2864 WerFault.exe 83 2808 2864 WerFault.exe 83 4808 2864 WerFault.exe 83 3208 2864 WerFault.exe 83 3052 2864 WerFault.exe 83 732 2864 WerFault.exe 83 3416 2864 WerFault.exe 83 3068 2864 WerFault.exe 83 1168 2864 WerFault.exe 83 3896 2864 WerFault.exe 83 708 2864 WerFault.exe 83 4808 2864 WerFault.exe 83 3676 2864 WerFault.exe 83 3144 2864 WerFault.exe 83 1168 2864 WerFault.exe 83 4912 2864 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2216 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 94 PID 2864 wrote to memory of 2216 2864 11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\11bc61071af789ba85c6fc3661dd6b8d_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 5402⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 5482⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 6082⤵
- Program crash
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 8242⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 9082⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 8802⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 8242⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 10882⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 10962⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11042⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11082⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11482⤵
- Program crash
PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11082⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 10962⤵
- Program crash
PID:3068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11562⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11082⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11562⤵
- Program crash
PID:708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 10882⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11562⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 11442⤵
- Program crash
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 9402⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 10882⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2864 -ip 28641⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2864 -ip 28641⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2864 -ip 28641⤵PID:516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2864 -ip 28641⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2864 -ip 28641⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2864 -ip 28641⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2864 -ip 28641⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2864 -ip 28641⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2864 -ip 28641⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2864 -ip 28641⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2864 -ip 28641⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2864 -ip 28641⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2864 -ip 28641⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2864 -ip 28641⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2864 -ip 28641⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2864 -ip 28641⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2864 -ip 28641⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2864 -ip 28641⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2864 -ip 28641⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2864 -ip 28641⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 2864 -ip 28641⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2864 -ip 28641⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5ac692db4755f3d362b16c12ad96bf219
SHA18d1ae54132566e0caa20cc5f78e85988ecc37549
SHA25636b3f0a7e3ce4f309933417f0e2965a65315f55722f1f0f84132340be9a8e054
SHA51235a376f5615ac53c762f8df1db1bfd34918d00f1a144359107ee007f9db9421e5902d1045f57aaf8144f1bcf9116c2c6bac9614f5c7b29b83bc92efd40d62a85