Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe
-
Size
404KB
-
MD5
aa8d56b5908a2dd5c99f079fd2817886
-
SHA1
082ada8d53fc3c491113ffaa8c5f96a1eecbecbd
-
SHA256
bbd2a50b5e30c3c84c9d1a4ec6a3a8af298f5125b4803b668df14b6ba6a01c24
-
SHA512
3711b5219e900ae64768f71047b6c9c84eaaed7d34f2c184e05db772e67c67fbe61d02d28907fb1fcf5bb7ed2b6d244c16f8ebe9ab8b08f960ffb5b30176934a
-
SSDEEP
6144:KvlmnzWpaM+Qtpz8pgm7wcJiKK4oggV9HFtBN/ro5HBgo04:KvlmnzFTQtpzAWPKHtgV93eGz4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exeaa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exeftpdeep.exeftpdeep.exeftpdeep.exepid process 3664 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe 3664 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe 2496 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe 2496 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe 3076 ftpdeep.exe 3076 ftpdeep.exe 4640 ftpdeep.exe 4640 ftpdeep.exe 904 ftpdeep.exe 904 ftpdeep.exe 904 ftpdeep.exe 904 ftpdeep.exe 904 ftpdeep.exe 904 ftpdeep.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exepid process 2496 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exeftpdeep.exeftpdeep.exedescription pid process target process PID 3664 wrote to memory of 2496 3664 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe PID 3664 wrote to memory of 2496 3664 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe PID 3664 wrote to memory of 2496 3664 aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe PID 3076 wrote to memory of 4640 3076 ftpdeep.exe ftpdeep.exe PID 3076 wrote to memory of 4640 3076 ftpdeep.exe ftpdeep.exe PID 3076 wrote to memory of 4640 3076 ftpdeep.exe ftpdeep.exe PID 4640 wrote to memory of 904 4640 ftpdeep.exe ftpdeep.exe PID 4640 wrote to memory of 904 4640 ftpdeep.exe ftpdeep.exe PID 4640 wrote to memory of 904 4640 ftpdeep.exe ftpdeep.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa8d56b5908a2dd5c99f079fd2817886_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
-
C:\Windows\SysWOW64\ftpdeep.exe"C:\Windows\SysWOW64\ftpdeep.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ftpdeep.exe"C:\Windows\SysWOW64\ftpdeep.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ftpdeep.exe"C:\Windows\SysWOW64\ftpdeep.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/904-29-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/904-28-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/904-27-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/904-24-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/2496-18-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/2496-6-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/2496-9-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/2496-10-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/3076-12-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/3076-14-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/3664-0-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/3664-3-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/3664-2-0x0000000000BFA000-0x0000000000BFE000-memory.dmpFilesize
16KB
-
memory/4640-19-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB
-
memory/4640-21-0x0000000000BC0000-0x0000000000C3B000-memory.dmpFilesize
492KB