Overview
overview
10Static
static
31d92475e5f...18.exe
windows7-x64
101d92475e5f...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3streamTran...st.exe
windows7-x64
7streamTran...st.exe
windows10-2004-x64
7Analysis
-
max time kernel
129s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/splash.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/splash.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
streamTranscoderv3-uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
streamTranscoderv3-uninst.exe
Resource
win10v2004-20240419-en
General
-
Target
1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe
-
Size
175KB
-
MD5
1d92475e5f11ddf8256835c4bfb196a3
-
SHA1
c40bc3e3fd25bf6b872b0e7953c9f5d833b522de
-
SHA256
40c913b6837bb03dd168536710d88a05faa6a6956b1c210758a0979a6782bf62
-
SHA512
170fac19f61ade42c378811c6f11e91f62319c0b7ad77a9f1138db867bbd21ad48c54d1b3689b8e1d77be483e1a0b39bfe90dc6935e662c5f87aa823b8fc58d6
-
SSDEEP
3072:NLuXzXwYyr6Dooc245Wi6BrurQddYuscHUA4nKH6TeKtZiM+CC55wl+:NpCbprurQduux4nK6eKtczCO2l+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1872 1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3480 1872 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1872 wrote to memory of 816 1872 1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe 89 PID 1872 wrote to memory of 816 1872 1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe 89 PID 1872 wrote to memory of 816 1872 1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d92475e5f11ddf8256835c4bfb196a3_JaffaCakes118.exe"2⤵PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 9202⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1872 -ip 18721⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6