Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 09:25
Static task
static1
Behavioral task
behavioral1
Sample
2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe
-
Size
196KB
-
MD5
2434e74a5adcf1530d186b9e014db3e3
-
SHA1
76593f8cda816b7d4671a19c8de10c81a1fcf6f5
-
SHA256
a3f8f0f0229d7c0907a6e4c47a9f4b47ef3d9d1097a71796cbb6517ede83b4d2
-
SHA512
92cae0c934e45655fc24b2f8de777fae3d05bccf38cd950b664b380f9c48d71264431ce45bc0a57c852d77d1d20b31e5ca834d61047dc334606a93f72b186e93
-
SSDEEP
3072:fAvd9J7NZ3zANXgmIAjzp8CKi/nRkkBpuEPFCh0/p/nRCWY86bIWLu4Nrme/1Zm:fAbJ7ANXdIAjDd/7pzP0
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 187.207.114.26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe 1828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe 4828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe 4828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe 1012 wordpadculture.exe 1012 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe 2968 wordpadculture.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1828 wrote to memory of 4828 1828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe 84 PID 1828 wrote to memory of 4828 1828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe 84 PID 1828 wrote to memory of 4828 1828 2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe 84 PID 1012 wrote to memory of 2968 1012 wordpadculture.exe 91 PID 1012 wrote to memory of 2968 1012 wordpadculture.exe 91 PID 1012 wrote to memory of 2968 1012 wordpadculture.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2434e74a5adcf1530d186b9e014db3e3_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4828
-
-
C:\Windows\SysWOW64\wordpadculture.exe"C:\Windows\SysWOW64\wordpadculture.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\wordpadculture.exe"C:\Windows\SysWOW64\wordpadculture.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-