Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
5c265bdf08b3369062acf7fd7a90e7b7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c265bdf08b3369062acf7fd7a90e7b7_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
$_3_.exe
-
Size
1.7MB
-
MD5
d4c16982f8a834bc0f8028b45c3ae543
-
SHA1
9d9cec9af8f23a23521e20d48d9af1024663a4a7
-
SHA256
932badf8ce27381bd595c9d861d7f7142fe98f233a893a2003a5f5e5ec163b3b
-
SHA512
c94b8d978afac107c08a5405cf9510e48d4bcf1284292eee1d08898f1c7a43a83a9655dc4d85d27d3b825e45a8f136c7beb71405fab94bb5e2437b7c4ad44b5c
-
SSDEEP
49152:n7mrmYPoEHVGTWFkO4ITVpSuEqM/vrM3rA3SuN5:km2Z12WFYFVf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2924 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1664 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1664 $_3_.exe 1664 $_3_.exe 1664 $_3_.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1664 wrote to memory of 936 1664 $_3_.exe 30 PID 1664 wrote to memory of 936 1664 $_3_.exe 30 PID 1664 wrote to memory of 936 1664 $_3_.exe 30 PID 1664 wrote to memory of 936 1664 $_3_.exe 30 PID 936 wrote to memory of 2924 936 cmd.exe 32 PID 936 wrote to memory of 2924 936 cmd.exe 32 PID 936 wrote to memory of 2924 936 cmd.exe 32 PID 936 wrote to memory of 2924 936 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\24356.bat" "C:\Users\Admin\AppData\Local\Temp\C496AF0D59D242EFAEB1096C7B1E9715\""2⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD5d981bd54ec18f0d977923a4c100a0f3b
SHA1b3ed89c64e503a18eea744d1ba0db7a9d9444b6b
SHA256f217904325706cd6cc2f15870bef6a9c431db75a94eaf94f6ca8f1e972b0afee
SHA5121a6ea173418777621806a10c521e48867ff97e99dcfbbe3b536ad9f4c81a6f47f0197aade42258e8ee4153ac42b420e04cbc8a648f0e50cf4bdbdca4354562b3
-
Filesize
544B
MD5e026ff4d3d77e08db4e3488d3f0ecd66
SHA1be6827dcd6c8a49e236df86a393b6ae64190c69b
SHA25688d59537226bcb6ef27749f2b344e4799f374823fd97d771f73d9b3ba02140eb
SHA5127db3e182f2745ebf0d07eeba7734c130e3579a26ec29a68f65ddebb9bb580647c1759253530aea85f3619ed1f8f1bc6741c97d22a4823b322c65573fa12f2877
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\C496AF0D59D242EFAEB1096C7B1E9715\C496AF0D59D242EFAEB1096C7B1E9715_LogFile.txt
Filesize2KB
MD5ce4ec29f1832c600c4e7a7fe92448b05
SHA1ccc5cc9f778ffb4c4221d917272d749c50a38121
SHA256e798a515ef4087dc531d68620b2b6676f125e770726a64ee84531bdccfe9c079
SHA51296d789f31ea59a2ef54d7cfadcbff7eb4f9784417481ed63dd957bcdd76cce805196c45d237f86b28d6bc541bd949c66975338d35289ba6872d81498527ed5c2
-
C:\Users\Admin\AppData\Local\Temp\C496AF0D59D242EFAEB1096C7B1E9715\C496AF0D59D242EFAEB1096C7B1E9715_LogFile.txt
Filesize4KB
MD5e7d8f3fd3cb60e752c8790d16418daad
SHA1cf01b461bace7146fd66b10d46e19aae14040bfc
SHA2567ca5b9097f18552c31f769cbd83bbf8aad54e78200f22aef23979a5720d11a28
SHA5120cf4d99289166298bbf83b791cd4df01097933364ff319999c808b84d2962082d0fa23f78d4058a99003a1671ed871d5d68483b6372134747f22ba8a7ac191ec
-
Filesize
28KB
MD5e97ee9d9c1b343e03d2aa26c1d075416
SHA1902e29f1059ae27ac9ae76267f80e088004fead1
SHA256f01e954fb09fac777444c9813114e9300be88d421ed77d108557dc35870d4ef3
SHA51238041098743c864b674bbdbe77d624314701f06ecb5f397243f6fac68ad9f86a2a9db59533133bf5697c0744350814a82e8c0ff5df531274dcd8fd7268fdf9db