Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe
-
Size
138KB
-
MD5
dcc318548f7dc8e89019a09677b743e9
-
SHA1
6b187523d177dd89190d77824a29113bbcd41065
-
SHA256
49362b91fada3e61b4314384c454e60fcd42e82de1693d89483eacba6fc0563a
-
SHA512
1b6ad2c6674a209ed629ac1c1cb6f8f70b964dd5aa76421d1bd8443def6e67a7ffbf23799af4059667c19ec823d6bf2703658ea2a928dc21fdac195394d434ad
-
SSDEEP
768:M/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLsHkLR:MRsvcdcQjosnvnZ6LQ1EMyR
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1056 jusched.exe -
Loads dropped DLL 2 IoCs
pid Process 1252 dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe 1252 dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe 1056 jusched.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1056 1252 dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1056 1252 dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1056 1252 dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1056 1252 dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcc318548f7dc8e89019a09677b743e9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD59c8a1fe1d8feb00b9d4d14bf8cc72801
SHA19d1afeebe270af96b4e894403a82a7eafd16b932
SHA256dfeeb19442bc01cfc915652abe5891cc6dadf69cf6680afd59e60ef934914a09
SHA51205bebded1d808f57cf822db3e282530d885077fcc1d1fd30bb9e174717b1cd76f36987db57a08c87538346c2f1a106a7ec036aa4198d3de2e4adb5eb599a0f49