Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240508-en
General
-
Target
7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe
-
Size
789KB
-
MD5
7e71adcb41a3ada3784440b1ef838bab
-
SHA1
fd4eb1a861514fa84dc752c435239d9fdb588aed
-
SHA256
3eefd6f5d8370463fe5abc16ca4501c81fe2a63ceb2e06fad7fcb08bcc4426d3
-
SHA512
bd8b4cc3312b03bfa411c3630ead105edda4ef7456b4ab61318f6e8e55f249da7c403e15a01b7d2d201c80447383ad7cad1aa9ae701d78217f2414091e92bd02
-
SSDEEP
12288:GtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44c7:Gt8RHjEgYAw1hZlZTWQu7igcyKPEujq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2064 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2064 2104 7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 28 PID 2064 wrote to memory of 1728 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 31 PID 2064 wrote to memory of 1728 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 31 PID 2064 wrote to memory of 1728 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 31 PID 2064 wrote to memory of 1728 2064 internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\nsd2741.tmp\internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsd2741.tmp\internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsd2741.tmp/fallbackfiles/'2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7823.bat" "C:\Users\Admin\AppData\Local\Temp\8546CDB10861469BB5084AD4EC453FEB\""3⤵PID:1728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD534549c0b0612db3c84da99eedb12671e
SHA14e2013cd776f5ced7078af960493754f5de0d115
SHA2563ac3523af821afdc3598bf048843c223d0a6e2232ee3135747df7c5a2a0b4156
SHA5127e3e67568bbc516fe49684d2d59940a6ad0927bebbbef38ac1ea9e7024669eb3942976d30f48aa8b982ff6bcb61591fcfc4a6b5570b9e4aaa29f5fcc13aa25f7
-
Filesize
544B
MD543e1a5f855a9167228df7acea63ed12f
SHA17518e0424983aef8717898c078d83389cb5f8198
SHA2560a9bef834bc53aa5a1084ba5980bdfde73c65984bf199483737002cc4a7bf8f5
SHA512f63bd2a299cb1e0cafed7c41e0f1061e45b74a41475a6c20449af791e9562b38ed4c7ea5430812a3655bf9a29d3cbbf29a8cd169b23bfb9c6fc5eddd04e472ba
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\8546CDB10861469BB5084AD4EC453FEB\8546CDB10861469BB5084AD4EC453FEB_LogFile.txt
Filesize9KB
MD56a1dd7c7b0e610c75a09c900d280bd44
SHA1218abbe2dc94b4be70ac0ac9c9a6db620b5829a6
SHA256091e3a00df8926172d3fea53aba63963eed6f3f4b5ee99308b39c746b125e2d2
SHA512a9bc6bdabdc76deed82b415772c14fb909aae49e473a043df569a2add585f5a2b42f48fbdd7dea377c78c26f4af2fe0170d3a64b0eb92c5edab6c84286abdf4d
-
Filesize
104KB
MD54d93d0e1ce0f64254021ca119e0a25b1
SHA186baa47ab42df2320f8caf7b196f492a96e594b6
SHA2561973db29406bf979be24bfba4f7f79b2e99dfb0018b1f6c309b10c0feba3efa5
SHA5127b4fb38c3854086acef1e46d4077d1bfc3b5c9e49c24e53feda0e766fb1c8402d39435c78c27afea884d8178a37b96cd54144f80799c53982438290f13466740
-
C:\Users\Admin\AppData\Local\Temp\nsd2741.tmp\internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nsd2741.tmp\internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
\Users\Admin\AppData\Local\Temp\nsd2741.tmp\internal7e71adcb41a3ada3784440b1ef838bab_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066