Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
4186b6666739bebf89f51054633fcaec_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4186b6666739bebf89f51054633fcaec_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
4186b6666739bebf89f51054633fcaec_JaffaCakes118.exe
-
Size
237KB
-
MD5
4186b6666739bebf89f51054633fcaec
-
SHA1
3ce353e25701585f38a95b957534f5122f4f89f1
-
SHA256
201cfa8e6cdc8edc3f8cac47bd4231e4e8c18b1033e839f4e338840b68045d42
-
SHA512
f070ca891e8ce8c71521d510fb08b2bc9b319623a21ba4dd6e96d378ad45e7a4953dcf40dc671fe97ce06e7c173bfb24213fad812572a17c4877fe3bc7af38c2
-
SSDEEP
3072:4bFZBpiJrsZnWSulEobukNhYNcPygJHc0VG25KRiYS2OarUSEJH/86DVJAknokaK:4bF3pSwJPqukpPy6jVGqx+rPE3T1aMp
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2132 racmzae.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\ttbtowf.dll racmzae.exe File created C:\PROGRA~3\Mozilla\racmzae.exe 4186b6666739bebf89f51054633fcaec_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1728 4186b6666739bebf89f51054633fcaec_JaffaCakes118.exe 2132 racmzae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2132 1632 taskeng.exe 29 PID 1632 wrote to memory of 2132 1632 taskeng.exe 29 PID 1632 wrote to memory of 2132 1632 taskeng.exe 29 PID 1632 wrote to memory of 2132 1632 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4186b6666739bebf89f51054633fcaec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4186b6666739bebf89f51054633fcaec_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1728
-
C:\Windows\system32\taskeng.exetaskeng.exe {6FC922AA-E98D-40B4-A54E-79FDE2DB1912} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\PROGRA~3\Mozilla\racmzae.exeC:\PROGRA~3\Mozilla\racmzae.exe -cddhnyc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5ba746a1899796a3be30f53daf9c4f406
SHA1cd24f7303149122f430bf3d7aedec9e96dee05f7
SHA256afa3c621d04c5cf4b483c388961acfc1e863111780eb04667ce1e3646eb1c685
SHA512ade7b6f6d1259b2fe85e9241c7fff563e85970193cf09d8c465b7938943ea8ddd49cdda7b84c9552a8fb2b54aa0709322e6b5d96f89f8ea2233b2652fc1988f4