Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 12:06
Behavioral task
behavioral1
Sample
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe
-
Size
994KB
-
MD5
54a1556548c5044b244a4a3b9f43f16f
-
SHA1
5ac83e445f6c8004e7ab4d51f1f7ba3e4eab89fa
-
SHA256
490d94ddc0d29c728d676c84ee626a05c2105dd18c2ddd7bbde6b4a30d010699
-
SHA512
20998502d49cd199737ecffc63692091b59b98f06bcccc2170754da6c7043b8df0b9842b16f52877d712e0d27b5e072b8ae67033b3eba6adfef62b2f3f7252b8
-
SSDEEP
24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsx/:dJ5gEKNikf3hBfUiWx/
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\budha.exe family_ammyyadmin -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 2996 budha.exe -
Loads dropped DLL 1 IoCs
Processes:
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exepid process 2260 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exedescription pid process target process PID 2260 wrote to memory of 2996 2260 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe budha.exe PID 2260 wrote to memory of 2996 2260 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe budha.exe PID 2260 wrote to memory of 2996 2260 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe budha.exe PID 2260 wrote to memory of 2996 2260 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD59540878ae0ef978d7655e594b13d7f88
SHA1ae6a565fddb91cec9aa541adc92f847b35ed783d
SHA2567d25821febd290bc12edf959afb08f69228177fc2b8e5f2276711772d104016f
SHA51234215f7780f47cfac6027693492ca3aae3b19fcc9251c20cea5352de48e25a53d131318c56c3ca91bb37ba9f9e0ea214d7d230aced2fb5a8240e140d669fe0b1