Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 09:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
7 signatures
150 seconds
General
-
Target
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe
-
Size
148KB
-
MD5
adce284377cd66d0b73e10e7d01c20c1
-
SHA1
83f73b3e5add87fda0ea1b1962ab282122118687
-
SHA256
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c
-
SHA512
375af3e19e4a54f27343781207347248afff18bbfd52fe93e3f2666e88e5aca931f8e64d71d7e91136e32bd4769046b62379b4cebaee8598a2e3d14dca196d0f
-
SSDEEP
3072:2JRiGimmC0HZKYH1BuSqSlWkKoWCe7o021uw:2JREAqZdH1BuSqCWkKRC89
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exeadce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exeisswordpad.exeisswordpad.exepid process 3544 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe 3544 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe 4152 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe 4152 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe 3204 isswordpad.exe 3204 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe 1936 isswordpad.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exepid process 4152 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exeisswordpad.exedescription pid process target process PID 3544 wrote to memory of 4152 3544 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe PID 3544 wrote to memory of 4152 3544 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe PID 3544 wrote to memory of 4152 3544 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe PID 3204 wrote to memory of 1936 3204 isswordpad.exe isswordpad.exe PID 3204 wrote to memory of 1936 3204 isswordpad.exe isswordpad.exe PID 3204 wrote to memory of 1936 3204 isswordpad.exe isswordpad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4152
-
C:\Windows\SysWOW64\isswordpad.exe"C:\Windows\SysWOW64\isswordpad.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\isswordpad.exe"C:\Windows\SysWOW64\isswordpad.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3992 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:4004