Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 21:35
Static task
static1
Behavioral task
behavioral1
Sample
009f151c4ca7f2d9a214fdf51cbdeace_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
009f151c4ca7f2d9a214fdf51cbdeace_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
009f151c4ca7f2d9a214fdf51cbdeace_JaffaCakes118.exe
-
Size
185KB
-
MD5
009f151c4ca7f2d9a214fdf51cbdeace
-
SHA1
a5d52335797bec7d3cab54b3b013e65aa8591deb
-
SHA256
8aa84b11e7903fe77c536bb629157a63eb575b36b23b0a61cef8977afc99caf5
-
SHA512
144215701a8969b4dd77db181fc9e37ecbb70422aadf7d72a71a3e3df1206f6d608fd919f98429f47df5af6a9138962e76a57fc8982e7cda06ea0fdc5046e4b3
-
SSDEEP
3072:6KBYqKA1fjID6YxDrpuboYuooDwRiZhRL94VmGs99:PBxpm6UcojZhN9G
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svngage.exe 009f151c4ca7f2d9a214fdf51cbdeace_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 svngage.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\keys.ini 009f151c4ca7f2d9a214fdf51cbdeace_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2192 1732 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2192 1732 svngage.exe 29 PID 1732 wrote to memory of 2192 1732 svngage.exe 29 PID 1732 wrote to memory of 2192 1732 svngage.exe 29 PID 1732 wrote to memory of 2192 1732 svngage.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\009f151c4ca7f2d9a214fdf51cbdeace_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\009f151c4ca7f2d9a214fdf51cbdeace_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in Windows directory
PID:2452
-
C:\Windows\SysWOW64\drivers\svngage.exeC:\Windows\SysWOW64\drivers\svngage.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 2002⤵
- Program crash
PID:2192
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD5009f151c4ca7f2d9a214fdf51cbdeace
SHA1a5d52335797bec7d3cab54b3b013e65aa8591deb
SHA2568aa84b11e7903fe77c536bb629157a63eb575b36b23b0a61cef8977afc99caf5
SHA512144215701a8969b4dd77db181fc9e37ecbb70422aadf7d72a71a3e3df1206f6d608fd919f98429f47df5af6a9138962e76a57fc8982e7cda06ea0fdc5046e4b3