Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 07:39
Behavioral task
behavioral1
Sample
b76fc4e16b94851d924c545879908884_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b76fc4e16b94851d924c545879908884_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b76fc4e16b94851d924c545879908884_JaffaCakes118.exe
-
Size
994KB
-
MD5
b76fc4e16b94851d924c545879908884
-
SHA1
027cb41944ff7c79356f771d6be597561d490299
-
SHA256
b57d1c18a44424fbbd72c3900fe76399bc3bc043c9047679c564b849ccf9d178
-
SHA512
fca42de8b2a5ac4cbaabce8810eeff68a61abf902b9fe446c0d386d0d2da82d93ac943a92c3898c5a66fbb92f8566236e03bfbd38274c550186c0767fc4aaef2
-
SSDEEP
24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsxF:dJ5gEKNikf3hBfUiWxF
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\budha.exe family_ammyyadmin -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 2560 budha.exe -
Loads dropped DLL 1 IoCs
Processes:
b76fc4e16b94851d924c545879908884_JaffaCakes118.exepid process 2104 b76fc4e16b94851d924c545879908884_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b76fc4e16b94851d924c545879908884_JaffaCakes118.exedescription pid process target process PID 2104 wrote to memory of 2560 2104 b76fc4e16b94851d924c545879908884_JaffaCakes118.exe budha.exe PID 2104 wrote to memory of 2560 2104 b76fc4e16b94851d924c545879908884_JaffaCakes118.exe budha.exe PID 2104 wrote to memory of 2560 2104 b76fc4e16b94851d924c545879908884_JaffaCakes118.exe budha.exe PID 2104 wrote to memory of 2560 2104 b76fc4e16b94851d924c545879908884_JaffaCakes118.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76fc4e16b94851d924c545879908884_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b76fc4e16b94851d924c545879908884_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD5251460c3e810afed1c9bb1cba0953188
SHA17235eb3ab9e75e37fdd80025006329c631eef620
SHA256f053fa5d2ebb6241d297b87960a983d76500fa384c1bae2e427f4fc62ad7ff35
SHA512d76525bad74e78917353e97c91d86f4628acebe14ee4de49ded9dd2edaf16e974f68aeb33c8663ae72e87ba99f5378803254fd2db3285062a417024b19b796b8