Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 23:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
615af308123f3abe754d69de2162b383_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
615af308123f3abe754d69de2162b383_JaffaCakes118.exe
-
Size
148KB
-
MD5
615af308123f3abe754d69de2162b383
-
SHA1
412a04a5ca34e217f34a26a0816055b36870314e
-
SHA256
9d0f8bb5cebd8d1ee8f41ec21a2971ac150c632431d51a4a74fcac23db297422
-
SHA512
487e057d89cdd6bf8408ad37f05a0cb0c9508ab6284368c09477b86366b591789c2f6eb3153162cb0af301178b0f830f6904512edc3cae7feff743eac2f30971
-
SSDEEP
3072:d3HRqRIzdRAgjZMIYMiLFqib3eiH8vKELXIu/3Z49zCWH9Y:FHRVxR/ZcLFJbD0KOXIu/itC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe 2544 lsoutilman.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1296 615af308123f3abe754d69de2162b383_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2544 1296 615af308123f3abe754d69de2162b383_JaffaCakes118.exe 28 PID 1296 wrote to memory of 2544 1296 615af308123f3abe754d69de2162b383_JaffaCakes118.exe 28 PID 1296 wrote to memory of 2544 1296 615af308123f3abe754d69de2162b383_JaffaCakes118.exe 28 PID 1296 wrote to memory of 2544 1296 615af308123f3abe754d69de2162b383_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\615af308123f3abe754d69de2162b383_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\615af308123f3abe754d69de2162b383_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\lsoutilman.exe"C:\Windows\SysWOW64\lsoutilman.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-