Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 11:27
Behavioral task
behavioral1
Sample
b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe
-
Size
1012KB
-
MD5
b344c201a9640ebb274b8563652c0706
-
SHA1
5745ef173d9a116dc8123330f8cdc228b9415c6a
-
SHA256
53aaff56d3ce4fb2f53347afa0213257e9d5c27ee3b8ed9eaa5d1f8303755b70
-
SHA512
aa85e9238d4642d1759b38bec670afb1c096f5cf1ad2eabc30caa96bb295cbe924984c41baeb37c9146ecf23cfa997a6f8732144030a369816f983f1c29630ef
-
SSDEEP
24576:+MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxH:7J5gEKNikf3hBfUiWxH
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\budha.exe family_ammyyadmin -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 1116 budha.exe -
Loads dropped DLL 1 IoCs
Processes:
b344c201a9640ebb274b8563652c0706_JaffaCakes118.exepid process 2448 b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2448-0-0x0000000000400000-0x0000000000410000-memory.dmp upx \Users\Admin\AppData\Local\Temp\budha.exe upx behavioral1/memory/2448-9-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1116-13-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b344c201a9640ebb274b8563652c0706_JaffaCakes118.exedescription pid process target process PID 2448 wrote to memory of 1116 2448 b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe budha.exe PID 2448 wrote to memory of 1116 2448 b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe budha.exe PID 2448 wrote to memory of 1116 2448 b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe budha.exe PID 2448 wrote to memory of 1116 2448 b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b344c201a9640ebb274b8563652c0706_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1012KB
MD5e745d3bb4fe9effc3a04b4c5ce5743cf
SHA18e204affd8793cf2a69f0e7baed99d25cb27d384
SHA256fefb824f892e4211a1351d17cc94d805889b1f764a7935fb0c10938369aa3b7a
SHA512b88746e10e4beaa2626de71c01318269d33cd49d6dee950f0b5c837b2b331d175d78bff93a873c57608205c0c50a424847767dbdc4ed56901c0789453c1a49de