Analysis
-
max time kernel
144s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 00:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
7 signatures
150 seconds
General
-
Target
57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe
-
Size
828KB
-
MD5
57bed6da02570b8f02d5347fb2ff2f26
-
SHA1
2ff2d8f391a3cce38cbe5be9baed0ea674863b18
-
SHA256
813d2d9ba5cc48c0b99e18bb197929be347cda5b538af172af5ac7bb3aa22de7
-
SHA512
df2b3b5abe616ffe468f9078d1a0e07c1a4023f6c0903be091d0652479583deb42e4214e870b480d454c6f129963547b803017aa595ea57f50ab1f3751b6f1e2
-
SSDEEP
3072:H/ozMMwmf/sPkBnntDhHUknC+Km/8wmV9c5+yfgGQAaT:H/ozMMwmfeinnhhHU0C+p/h+Egt1T
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exeappxcbgnd.exeappxcbgnd.exepid process 3264 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe 3264 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe 4552 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe 4552 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe 1696 appxcbgnd.exe 1696 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe 5024 appxcbgnd.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exepid process 4552 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exeappxcbgnd.exedescription pid process target process PID 3264 wrote to memory of 4552 3264 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe PID 3264 wrote to memory of 4552 3264 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe PID 3264 wrote to memory of 4552 3264 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe 57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe PID 1696 wrote to memory of 5024 1696 appxcbgnd.exe appxcbgnd.exe PID 1696 wrote to memory of 5024 1696 appxcbgnd.exe appxcbgnd.exe PID 1696 wrote to memory of 5024 1696 appxcbgnd.exe appxcbgnd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\57bed6da02570b8f02d5347fb2ff2f26_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4552
-
C:\Windows\SysWOW64\appxcbgnd.exe"C:\Windows\SysWOW64\appxcbgnd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\appxcbgnd.exe"C:\Windows\SysWOW64\appxcbgnd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:1952