Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 04:23
Behavioral task
behavioral1
Sample
3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe
-
Size
993KB
-
MD5
3ddd87914b03464dec7ce22534e9e779
-
SHA1
099d3432b497f56d34a41832e7c21a4b155f6e5b
-
SHA256
abdfad0c57f3e708ebcc12b3c829baf4f8d8dc8a26a4e3753bc2e5b7a2a26d8c
-
SHA512
00982884fff0fe650bfffe26fb98d74004acf709a0300622040f0ea2ab357f57584da8f2d31a7547b7062356ececd616902cb6dc600e02a005f17cd64589fca2
-
SSDEEP
24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxD:dJ5gEKNikf3hBfUiWxD
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\budha.exe family_ammyyadmin -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 2116 budha.exe -
Loads dropped DLL 1 IoCs
Processes:
3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exepid process 2456 3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exedescription pid process target process PID 2456 wrote to memory of 2116 2456 3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe budha.exe PID 2456 wrote to memory of 2116 2456 3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe budha.exe PID 2456 wrote to memory of 2116 2456 3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe budha.exe PID 2456 wrote to memory of 2116 2456 3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ddd87914b03464dec7ce22534e9e779_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD56fe20a0b2410f95b32a133999177f893
SHA123e60431999505fc6add7fbe7dda780faf8bdbfd
SHA256054b09569289c34aa180a9943dcda0d71667160be4c4b14432140bcc5dc6fc09
SHA51241c5be008cea38a4e8513bc28fec13c745e106620a3df4d0c2ee7b289c69b9e7d8507bddf2c3fcc3843a570037753ab5a600c2d0c3f1074acf4fc870f8294e72