Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
6bde4c70d6c9fa329fc1c4d4ac753d30
-
SHA1
99cf1a2681ac37418acf61d9871a3a6b1ff1a11a
-
SHA256
812c0ef157c5d6a2560f3fb7ec60067dd19bbbf87dd811cf6a1d8a4afb223389
-
SHA512
57c1863b708c4d7dd1838a9fb1042217ba44e74257f984de3190f5223e08416573f5921044beb3c0bc117e581f665cb73c5c03bf68a4ba7b8dcb6940c9fc6f13
-
SSDEEP
49152:jZgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9R:jGIjR1Oh0T1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exepid process 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exepid process 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.execmd.exedescription pid process target process PID 2240 wrote to memory of 2068 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe cmd.exe PID 2240 wrote to memory of 2068 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe cmd.exe PID 2240 wrote to memory of 2068 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe cmd.exe PID 2240 wrote to memory of 2068 2240 6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe cmd.exe PID 2068 wrote to memory of 1732 2068 cmd.exe PING.EXE PID 2068 wrote to memory of 1732 2068 cmd.exe PING.EXE PID 2068 wrote to memory of 1732 2068 cmd.exe PING.EXE PID 2068 wrote to memory of 1732 2068 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6bde4c70d6c9fa329fc1c4d4ac753d30_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4918.bat" "C:\Users\Admin\AppData\Local\Temp\54BA7B891FAB4F3687E55630B8C3ADCC\""2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\54BA7B891FAB4F3687E55630B8C3ADCC\54BA7B891FAB4F3687E55630B8C3ADCC_LogFile.txt
Filesize2KB
MD5ff800dffdac815c3e5c201038352357d
SHA15bc323c4fe47cb6fc68a9f53f9fc6f60e9a03f39
SHA2560f819bf9500a3b859ab143602e6251081e4bcb8095bb383e3218b65d4b433686
SHA512c680bf70ff024914c5b046c1af882a8274398903efca16ad2d6c82cc1de4c55a8f14d0ea8b0418fb238af4ba5d84268bd2c2e886e5b5ba8fcc67d36d4e835605
-
C:\Users\Admin\AppData\Local\Temp\54BA7B891FAB4F3687E55630B8C3ADCC\54BA7B891FAB4F3687E55630B8C3ADCC_LogFile.txt
Filesize10KB
MD528d78446ea24ed311e70ac35aa10c913
SHA1336976c37526145f47e5d431753db84efff41186
SHA2567d93ce00749dc390a287bb28b3a37384fa9cece0b5acebba6443cebde606bd41
SHA512c4ada3a48e041633c2168bf7358473d2a5055ad141f5cc7f52afb53e4242165de387225ec6f09692b81678df869daf9521bf41b01c258fc5fa14bd9b7eb0a24c
-
Filesize
106KB
MD546614813811d76f329293441ae28e26a
SHA1fbd8706048e4eba0b80b3e3a126f542852461e23
SHA256deae1595be5481d5a05d6fd20c1a396ab59522fb5b4085eb6a94b66ff056957e
SHA512966fb5302871bf4e9f1bd03a669d10678556dd74c3648dbd25201d25777f242a87ff84c27f36954aafb338dd5226069ea2a87665796ae5ae3a03276d9f5a506d