Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
6fff42c279c27218020aa1d8119d3b2b
-
SHA1
49a6a5f7cf5d51a8253cefb978ccce8f0fc0e26b
-
SHA256
f7736a607d74279e4fe93e659b4f6443210c8f5b4b9a75f49ae009d5039d251f
-
SHA512
b94c36af8c3c12777c396d452d89ecc826d789bec8e265aadd0dc7b118fe0e7c36d41bc469d6418fab27507ae661511418bfe6c306d7be086299d64e9a6ef8ac
-
SSDEEP
12288:xrsgNPqIHfoF5Nrv66hifW4HIcwjXigKatzN/PCipBzvEQzjpLcvKM4ZvbG:Vsgthfse6hifWkF6i/4NhzvEmL0KVpi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3028 installer0.exe -
Loads dropped DLL 4 IoCs
pid Process 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3028 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 28 PID 2932 wrote to memory of 3028 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 28 PID 2932 wrote to memory of 3028 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 28 PID 2932 wrote to memory of 3028 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 28 PID 2932 wrote to memory of 3028 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 28 PID 2932 wrote to memory of 3028 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 28 PID 2932 wrote to memory of 3028 2932 6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6fff42c279c27218020aa1d8119d3b2b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\installer0.exe"C:\Users\Admin\AppData\Local\Temp\installer0.exe" /R /VERACC=1.1.69.0 /VERPCK=2.2.2031.0 /VERSEC=0.0.0.02⤵
- Executes dropped EXE
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56fff42c279c27218020aa1d8119d3b2b
SHA149a6a5f7cf5d51a8253cefb978ccce8f0fc0e26b
SHA256f7736a607d74279e4fe93e659b4f6443210c8f5b4b9a75f49ae009d5039d251f
SHA512b94c36af8c3c12777c396d452d89ecc826d789bec8e265aadd0dc7b118fe0e7c36d41bc469d6418fab27507ae661511418bfe6c306d7be086299d64e9a6ef8ac