Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
72d6da74325ed96c35b852108a120393_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72d6da74325ed96c35b852108a120393_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240426-en
General
-
Target
$_3_.exe
-
Size
1.8MB
-
MD5
9ab5db4bb5971035b4d287d64f9676b5
-
SHA1
33d17f016339572dd05c124d6243fffefd0cd039
-
SHA256
f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
-
SHA512
d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
SSDEEP
49152:G0BIrT/YNRoLlps7tZokvTopSdmX4Foni7iMmdc:GbTRps7Xj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1064 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2416 $_3_.exe 2416 $_3_.exe 2416 $_3_.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1952 2416 $_3_.exe 30 PID 2416 wrote to memory of 1952 2416 $_3_.exe 30 PID 2416 wrote to memory of 1952 2416 $_3_.exe 30 PID 2416 wrote to memory of 1952 2416 $_3_.exe 30 PID 1952 wrote to memory of 1064 1952 cmd.exe 32 PID 1952 wrote to memory of 1064 1952 cmd.exe 32 PID 1952 wrote to memory of 1064 1952 cmd.exe 32 PID 1952 wrote to memory of 1064 1952 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5259.bat" "C:\Users\Admin\AppData\Local\Temp\04DA617134CA40AC98248C3A2EA1501F\""2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD50643a0c154778e692168821cc4d5c0c3
SHA14e7d1db28b31d6ba3d954f894f9436c1842fc03a
SHA2568863d0f3a04225430d74d5b23cc750f840ee533db276bd42b3590105ffc208d5
SHA512f4e114b158471004e2112f93c47eb339206b2492fe5268c78c329e9b9288827d61b717e173e9172dcbb184ff970893dab576bc984f9487cc69a333d3e1e9fb7c
-
C:\Users\Admin\AppData\Local\Temp\04DA617134CA40AC98248C3A2EA1501F\04DA617134CA40AC98248C3A2EA1501F_LogFile.txt
Filesize9KB
MD556999fcd3de3d12232807f3b4287eccd
SHA1836438950bd4f72701d8fa9e83fd78758868a376
SHA256b26bdbe84c5b016d2ecd3956a8573f2d32750298455f7a2a8e58665e25bc0519
SHA5127cdbde819072fca03fb5c5e98f5ba2e9f03d3bec88410aef3570f39fc91bc33a0cefa964c8ca3d4e99e7f235d92290fc4b169512bcae2a764b05cd8d575cb840
-
Filesize
109KB
MD55fe151a5b1264e82becfbb05830eacd1
SHA1a1c79df96bf9f91134b6043f786ed95474f941bd
SHA256c3979c1995bcf88b6e793e6d563d6c0a802fab34f912a5f2ed4f08b0e973379c
SHA512ff0e10c93a8a829a79a351d7852ff59bb0f99f83bd11ea3fa7c1d8989e1f9f78b0da0111f5be4f8a50b8a44d845d10237a8c1140def19f9f959a246ba2470f6d
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680