Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
65df9d2476bb08c5445ba024e5f73a51_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65df9d2476bb08c5445ba024e5f73a51_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
$_3_.exe
-
Size
1.8MB
-
MD5
9ab5db4bb5971035b4d287d64f9676b5
-
SHA1
33d17f016339572dd05c124d6243fffefd0cd039
-
SHA256
f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
-
SHA512
d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
SSDEEP
49152:G0BIrT/YNRoLlps7tZokvTopSdmX4Foni7iMmdc:GbTRps7Xj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
$_3_.exepid process 2824 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
$_3_.exepid process 2824 $_3_.exe 2824 $_3_.exe 2824 $_3_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
$_3_.exedescription pid process target process PID 2824 wrote to memory of 2492 2824 $_3_.exe cmd.exe PID 2824 wrote to memory of 2492 2824 $_3_.exe cmd.exe PID 2824 wrote to memory of 2492 2824 $_3_.exe cmd.exe PID 2824 wrote to memory of 2492 2824 $_3_.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2197.bat" "C:\Users\Admin\AppData\Local\Temp\D7CA1222F34A41F08E49C04316A0F530\""2⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD516e9396bbb33b9b0dab90dfdc4472a9a
SHA1502f60418928138cb35e31cfe1b6c4efec1d3b01
SHA256237f835c63ed6f2d889b65a4a39ae88c9e5875b902c77933869ebe7ecd991ed3
SHA512a0ed052e9cfd0f046e2c386aee02d2f7edf7b925b4efe78ac448ad3ba0d24b70eac064b8d2e6f106472ab2324d43783c6945b439e03d23fe1dd5173c3cbe570a
-
Filesize
544B
MD5023f95f7e2ea16055422fcedf61c1d0d
SHA1b14af622ad85d7024fdc99ad9915ee55eee60b32
SHA256aad5ed2dd419bf739f016435036a660c54482dabc35d42e49dbb9d5bc6ee8ff3
SHA512305e40c17cde3c5edcc674cc8a5cf1e045d966a173218732a6a9d190e763f5dadce9461c3f5fc443d75811374e574266d6d10f6264456e74d5af60ce129e575c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\D7CA1222F34A41F08E49C04316A0F530\D7CA1222F34A41F08E49C04316A0F530_LogFile.txt
Filesize5KB
MD5c6e4948eb5f93a78d229b766f2078d37
SHA1dcb1d390da08133ace7ffa15f20fcc9503c2ffe7
SHA2566641cbd3ab860f66af769b44cba5aaff6efe620118f72abeac1994639af4def5
SHA5127855f2e0ab68997de41400e9cf6b10573c7b9087259402270ca5979c526d9b9d01d429580c3b2a627859fa9197826797389d958ed5f24e649e7417769dc943e6
-
C:\Users\Admin\AppData\Local\Temp\D7CA1222F34A41F08E49C04316A0F530\D7CA1222F34A41F08E49C04316A0F530_LogFile.txt
Filesize3KB
MD5d63ca18612db1816c334159cb6e1909a
SHA143ce8dfd714393749008fdcb8dc51f3ceb65ca57
SHA2562ac8515b485318b44293d64aa10a161ffd06790ca94b99906adc7c446564baeb
SHA512d77fa9268288bcef5d74173e8160b360159be708b3f26db9f844d8e174317a53db8ff91c99d20aaae622d01bc363003ecebbf3d44f8e926f1d4e610b548fcad5
-
Filesize
108KB
MD543e26cedec6c04f0aa91229ccd9d8798
SHA10e7f0841080c04298c66f7c47c9f58423bdc6479
SHA256229f5ae025c0a4e2d4b7d28efec4ee5993c3039d02b79a2a8436ce53f1682a89
SHA51245bca8e70dd2b660ff0ef9738b68e0c9ead63e08876b6c74384f8dca3e79d86cf324f267ff56390cedf0f2bfe341863ef29b45da1af8ee841dd038715e97322f