Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe
-
Size
148KB
-
MD5
58ea681bf441cb9ff0c32a701f8e64f6
-
SHA1
b2361b37f5c57eba2cea679d2b567ea4aad68271
-
SHA256
57fbd896d702c4b775bacd9aa8462beff18811da477780ed225cb8b35d7d8f6f
-
SHA512
a2584b42a8d85270ada8ea8da0c0d08964a1c7629260546fba1dc43a83d7889b09ef8b421880a5bb4cc3e21207d88b280f0235cdeaa1b4b9aefdf1b963fd666a
-
SSDEEP
3072:LChUtTp16NBrrQHWELHM5r18pbKTt7zklur2sHLPgOF+4C:2CtKBo2Hh18p2x7oVsHL
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 190.138.221.70 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exedafradar.exedafradar.exepid process 2844 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe 2844 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe 3044 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe 3044 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe 2760 dafradar.exe 2760 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe 2288 dafradar.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exepid process 3044 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exedafradar.exedescription pid process target process PID 2844 wrote to memory of 3044 2844 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe PID 2844 wrote to memory of 3044 2844 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe PID 2844 wrote to memory of 3044 2844 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe 58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe PID 2760 wrote to memory of 2288 2760 dafradar.exe dafradar.exe PID 2760 wrote to memory of 2288 2760 dafradar.exe dafradar.exe PID 2760 wrote to memory of 2288 2760 dafradar.exe dafradar.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\58ea681bf441cb9ff0c32a701f8e64f6_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3044
-
C:\Windows\SysWOW64\dafradar.exe"C:\Windows\SysWOW64\dafradar.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\dafradar.exe"C:\Windows\SysWOW64\dafradar.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288