Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 23:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe
-
Size
204KB
-
MD5
96a462e5f978902dbbc9ef678c29d7a6
-
SHA1
f8e3a5addee354188311ebbd572afb062253623f
-
SHA256
5f89899fe13b50da5340cc44f5b7d576e3ff04ee3246cef7959ac46a1561619c
-
SHA512
4fb1a45b4a2bd49c824573f431b4bfde1831680eccec7a6eedd8d12cbf1f726a5b1443a744314d789b84b52b96dadbcb72a65bc6669d61357338efcf359113d8
-
SSDEEP
3072:1JB2nMWYJUAUMZjozQUFMK9M9lkS5jQeQ0NVxXFCRsPPJ8wxsdOqsJ3MBTyv//:sGWFMposUFMrYS3FXaIOOqsJMBmP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1340 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 1340 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 3476 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 3476 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 3060 examplepla.exe 3060 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe 3764 examplepla.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3476 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1340 wrote to memory of 3476 1340 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 83 PID 1340 wrote to memory of 3476 1340 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 83 PID 1340 wrote to memory of 3476 1340 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 83 PID 3060 wrote to memory of 3764 3060 examplepla.exe 96 PID 3060 wrote to memory of 3764 3060 examplepla.exe 96 PID 3060 wrote to memory of 3764 3060 examplepla.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3476
-
-
C:\Windows\SysWOW64\examplepla.exe"C:\Windows\SysWOW64\examplepla.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\examplepla.exe"C:\Windows\SysWOW64\examplepla.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-