Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:37
Static task
static1
Behavioral task
behavioral1
Sample
5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe
-
Size
225KB
-
MD5
5d362eba33594637b6c7b064d27f4551
-
SHA1
548e25c52781dd1374ea8bcd89b1ebef154e872a
-
SHA256
4232da6351ca054e51aa8fd159a917dbe27e12f186d28295b9a572fd17f0d992
-
SHA512
5b64574c4700e6a0f0335be1ec10f1388411b6beb552836487e45741ffe58169c7e5d63ce3f7785ab9c332aeba75caa5bde6893f9fa0f55ff7dd9f1078fb9cbf
-
SSDEEP
3072:Z88NYUc1kKIHz5DrDgPU4/M2Gi/7X0xDVhGnd4JwheuHPWlqc47svQjIP73jNc:Z+N/EPGndUwx+lb4ZIPDjN
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 187.207.114.26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exepnpadam.exepnpadam.exepid process 1240 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe 1240 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe 2708 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe 2708 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe 4720 pnpadam.exe 4720 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe 2904 pnpadam.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exepid process 2708 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exepnpadam.exedescription pid process target process PID 1240 wrote to memory of 2708 1240 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe PID 1240 wrote to memory of 2708 1240 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe PID 1240 wrote to memory of 2708 1240 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe 5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe PID 4720 wrote to memory of 2904 4720 pnpadam.exe pnpadam.exe PID 4720 wrote to memory of 2904 4720 pnpadam.exe pnpadam.exe PID 4720 wrote to memory of 2904 4720 pnpadam.exe pnpadam.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d362eba33594637b6c7b064d27f4551_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2708
-
C:\Windows\SysWOW64\pnpadam.exe"C:\Windows\SysWOW64\pnpadam.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\pnpadam.exe"C:\Windows\SysWOW64\pnpadam.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904