Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe
-
Size
275KB
-
MD5
656750f875112414a75fb4bf32a3353a
-
SHA1
1f66bba3d8a9da44b0ebe7a84c7b240b6eba3705
-
SHA256
761107a1e9e685c4bbce78c45111db8c0279bf530b123f5370620bcc6aa0b2bf
-
SHA512
7cde504a285f343972877b3e50cad0fa4b0f558a987288832e88d8f1d08062bc1b379220480f760f8469f6d10423b29f19538fca1bd8acd5bafaa29fb7a9ae90
-
SSDEEP
3072:WyZXE1FYZcYbV/wQvFUO+x33/mKOQ+/pclnNu8qLAZXNOp/PK7nbs5peTE0E925h:W0moc+VvFL+x33zORyI2OlPK7nbgpm9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe656750f875112414a75fb4bf32a3353a_JaffaCakes118.exenicinitial.exenicinitial.exepid process 4784 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe 4784 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe 440 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe 440 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe 3244 nicinitial.exe 3244 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe 1832 nicinitial.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
656750f875112414a75fb4bf32a3353a_JaffaCakes118.exepid process 440 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
656750f875112414a75fb4bf32a3353a_JaffaCakes118.exenicinitial.exedescription pid process target process PID 4784 wrote to memory of 440 4784 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe PID 4784 wrote to memory of 440 4784 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe PID 4784 wrote to memory of 440 4784 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe 656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe PID 3244 wrote to memory of 1832 3244 nicinitial.exe nicinitial.exe PID 3244 wrote to memory of 1832 3244 nicinitial.exe nicinitial.exe PID 3244 wrote to memory of 1832 3244 nicinitial.exe nicinitial.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\656750f875112414a75fb4bf32a3353a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:440
-
C:\Windows\SysWOW64\nicinitial.exe"C:\Windows\SysWOW64\nicinitial.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\nicinitial.exe"C:\Windows\SysWOW64\nicinitial.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832