Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240419-en
General
-
Target
24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe
-
Size
789KB
-
MD5
24f734b824590ef21dff24fb2f11f9d7
-
SHA1
cd31a7c212e9534dac2d7425eebc1838fb32dba8
-
SHA256
1e779c7ed1356d605ecf72dc710ea79bbe46447f14d045abca647dccccb84aee
-
SHA512
d3b160374a621463a81383ecf37ee0d4e22479178786c2d95a19a49d9803bf7543a579b2dd7a1abffe14b97d3c534838c4c6d1457877fca47391f552f1f1eb77
-
SSDEEP
12288:KtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44+W3:Kt8RHjEgYAw1hZlZTWQu7igcyKPEuj7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1564 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2448 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 28 PID 2392 wrote to memory of 2448 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 28 PID 2392 wrote to memory of 2448 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 28 PID 2392 wrote to memory of 2448 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 28 PID 2392 wrote to memory of 2448 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 28 PID 2392 wrote to memory of 2448 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 28 PID 2392 wrote to memory of 2448 2392 24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 28 PID 2448 wrote to memory of 1744 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 31 PID 2448 wrote to memory of 1744 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 31 PID 2448 wrote to memory of 1744 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 31 PID 2448 wrote to memory of 1744 2448 internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe 31 PID 1744 wrote to memory of 1564 1744 cmd.exe 33 PID 1744 wrote to memory of 1564 1744 cmd.exe 33 PID 1744 wrote to memory of 1564 1744 cmd.exe 33 PID 1744 wrote to memory of 1564 1744 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\nsi1A94.tmp\internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsi1A94.tmp\internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsi1A94.tmp/fallbackfiles/'2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\25646.bat" "C:\Users\Admin\AppData\Local\Temp\05B05F5E6C70411FBAD2D9C4DE05A27F\""3⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:1564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD50d8f8427e71454ec6a8fec19e5949aff
SHA17b391d43f85ae1bc3e4c3c9e764ce0927b79dd5b
SHA256cc8cc2a1b1428ab14e28fbe25dc0a824795425c88dd583e95648991a6bc3f973
SHA5127c34a32ea3ccfbe9771b218d5a81d288e747be8deccdb494812b9e054dd8874f31236011bf75231b384fd65e50b9dc7ebc8fe0f64a1f6e605275075e4a12e176
-
Filesize
544B
MD593c56fb8ea9a52e0394f1d232ed5426c
SHA15f855c19aad97c0870d0a8e994eaecbdd14bbd7d
SHA256f8c664a7a93b18fec440a819f9ca5a7fbb6ae3f941744d7aeba5c2cf5f2afda3
SHA512d8ad6b5167aebb7453ea534e6211f1fe9c0fab09e92ff297467335001f01f819cd58a8db71b04d9423263cd91d5ba9e8ef4230d8ffd2ad8f8d25987ef0255c39
-
C:\Users\Admin\AppData\Local\Temp\05B05F5E6C70411FBAD2D9C4DE05A27F\05B05F5E6C70411FBAD2D9C4DE05A27F_LogFile.txt
Filesize9KB
MD5b57fa074664c916dd3594497494a36f8
SHA1c76818c7e90dcb4397384742717160255f4aab4d
SHA2566869ad79ddff4b9004bb385b3f9ffcd117162128adc0ea9b02f5e47c0bdae75b
SHA51245713ab5776f98b1df2f47e1a9259db80ab0e47d8ee1d8bca3e6bfc850e27e88fbf206b52dea9ffe1ef68f2f53a39b5acb77dded35755ebe25d2ce286640146d
-
Filesize
112KB
MD5476a598ba706856548ab9221ea8dd97f
SHA18c55d542deb8359b8976b3aff6b60edfc0ca0167
SHA2561780f991edf2f52314950ca71ef43f74b3879304c454a2e10d116b1c6e474514
SHA51208f57a6bc3aa3527dd70978c07faaf1294487666ad072e1a89fba5a6c1c2ac028b78594dd5931e89372793ea187463b519cb777f9b0fd295cd32110b45a63ea9
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\nsi1A94.tmp\internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nsi1A94.tmp\internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
\Users\Admin\AppData\Local\Temp\nsi1A94.tmp\internal24f734b824590ef21dff24fb2f11f9d7_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066