Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 10:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
8 signatures
150 seconds
General
-
Target
45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe
-
Size
225KB
-
MD5
45a7339a8c7deaa2503f8343e6e6fd03
-
SHA1
03c4e6d50c91a53ff5299343131fa95265dbe526
-
SHA256
02ecffe82918f17ba1fcef2303a266e43db1f110c0760e1d41fd036dfd799afa
-
SHA512
fe21a8bbc16268c844ff8a00ed9a913bebb3eb2984f4893aaf86a45df516b751cab54bdc8c8b4186b048982837383ba3973e9b45fd39db55e684bb8c11f15be2
-
SSDEEP
3072:hreM18hNfd2Qn0n5DP0YSyo6Q2P8Y8h/ttG5E0NF6/ZaIXXXHbg32S:71iNfdBn0tSyfQc8Y8hFt
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 190.138.221.70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 436 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 436 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 2588 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 2588 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 4844 thunkright.exe 4844 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe 1412 thunkright.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2588 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 436 wrote to memory of 2588 436 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 84 PID 436 wrote to memory of 2588 436 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 84 PID 436 wrote to memory of 2588 436 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 84 PID 4844 wrote to memory of 1412 4844 thunkright.exe 96 PID 4844 wrote to memory of 1412 4844 thunkright.exe 96 PID 4844 wrote to memory of 1412 4844 thunkright.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2588
-
-
C:\Windows\SysWOW64\thunkright.exe"C:\Windows\SysWOW64\thunkright.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\thunkright.exe"C:\Windows\SysWOW64\thunkright.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-