Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
00272c2567df3790002d437d714e77bf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00272c2567df3790002d437d714e77bf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
00272c2567df3790002d437d714e77bf_JaffaCakes118.exe
-
Size
400KB
-
MD5
00272c2567df3790002d437d714e77bf
-
SHA1
1082a2414e25e8ea50ed8ce19f7458c4625629cd
-
SHA256
d8b25dfd4162bda73227600f2027ff24561707f7d5e8698c6c871732f96e6d20
-
SHA512
61b1d7188236942250d2089e79d8f769fc0b0497bdebb522146ec2a2c296dd2fe71fd8563c8dbee066cb562f15c961884cd23628b43cd73cef7a4dec914364c6
-
SSDEEP
6144:y2V/1S85Q1WWRyohxw2anHQYk005S6uYXv42uWNJp9MdYQCcNYDnyWIQe61DE+v:51S8+QFoXQHTk0gSengPNYDnX3Dv
Malware Config
Signatures
-
Executes dropped EXE 23 IoCs
pid Process 2772 cltjdrwnz.exe 2756 nddvrsyyg.exe 2548 gunzfssqo.exe 1808 rmxkmanbn.exe 2860 cehwabpuu.exe 2208 weraobjfc.exe 992 hwjmdcdxb.exe 2140 aosxrkyii.exe 1168 lgcbylatq.exe 1008 xxmnmlulp.exe 1980 qpwqalowx.exe 2324 bpgcpurpe.exe 1064 uhqodulzl.exe 2052 fzisjvfsl.exe 2236 rrsdyvids.exe 2584 kjcpmvcwa.exe 2640 vimtaewgz.exe 2520 gawepeqrg.exe 1624 zsgivftko.exe 2184 lkqukfnun.exe 1456 ecagynhnv.exe 2444 purjmojyc.exe 2480 aubvboeqj.exe -
Loads dropped DLL 46 IoCs
pid Process 1740 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 1740 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 2772 cltjdrwnz.exe 2772 cltjdrwnz.exe 2756 nddvrsyyg.exe 2756 nddvrsyyg.exe 2548 gunzfssqo.exe 2548 gunzfssqo.exe 1808 rmxkmanbn.exe 1808 rmxkmanbn.exe 2860 cehwabpuu.exe 2860 cehwabpuu.exe 2208 weraobjfc.exe 2208 weraobjfc.exe 992 hwjmdcdxb.exe 992 hwjmdcdxb.exe 2140 aosxrkyii.exe 2140 aosxrkyii.exe 1168 lgcbylatq.exe 1168 lgcbylatq.exe 1008 xxmnmlulp.exe 1008 xxmnmlulp.exe 1980 qpwqalowx.exe 1980 qpwqalowx.exe 2324 bpgcpurpe.exe 2324 bpgcpurpe.exe 1064 uhqodulzl.exe 1064 uhqodulzl.exe 2052 fzisjvfsl.exe 2052 fzisjvfsl.exe 2236 rrsdyvids.exe 2236 rrsdyvids.exe 2584 kjcpmvcwa.exe 2584 kjcpmvcwa.exe 2640 vimtaewgz.exe 2640 vimtaewgz.exe 2520 gawepeqrg.exe 2520 gawepeqrg.exe 1624 zsgivftko.exe 1624 zsgivftko.exe 2184 lkqukfnun.exe 2184 lkqukfnun.exe 1456 ecagynhnv.exe 1456 ecagynhnv.exe 2444 purjmojyc.exe 2444 purjmojyc.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File created C:\Windows\SysWOW64\cehwabpuu.exe rmxkmanbn.exe File opened for modification C:\Windows\SysWOW64\bpgcpurpe.exe qpwqalowx.exe File opened for modification C:\Windows\SysWOW64\vimtaewgz.exe kjcpmvcwa.exe File created C:\Windows\SysWOW64\purjmojyc.exe ecagynhnv.exe File created C:\Windows\SysWOW64\rmxkmanbn.exe gunzfssqo.exe File opened for modification C:\Windows\SysWOW64\aosxrkyii.exe hwjmdcdxb.exe File opened for modification C:\Windows\SysWOW64\lgcbylatq.exe aosxrkyii.exe File created C:\Windows\SysWOW64\bpgcpurpe.exe qpwqalowx.exe File created C:\Windows\SysWOW64\uhqodulzl.exe bpgcpurpe.exe File created C:\Windows\SysWOW64\fzisjvfsl.exe uhqodulzl.exe File opened for modification C:\Windows\SysWOW64\rrsdyvids.exe fzisjvfsl.exe File opened for modification C:\Windows\SysWOW64\zsgivftko.exe gawepeqrg.exe File created C:\Windows\SysWOW64\cltjdrwnz.exe 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\aubvboeqj.exe purjmojyc.exe File opened for modification C:\Windows\SysWOW64\purjmojyc.exe ecagynhnv.exe File created C:\Windows\SysWOW64\hwjmdcdxb.exe weraobjfc.exe File opened for modification C:\Windows\SysWOW64\uhqodulzl.exe bpgcpurpe.exe File opened for modification C:\Windows\SysWOW64\fzisjvfsl.exe uhqodulzl.exe File created C:\Windows\SysWOW64\zsgivftko.exe gawepeqrg.exe File opened for modification C:\Windows\SysWOW64\weraobjfc.exe cehwabpuu.exe File opened for modification C:\Windows\SysWOW64\gunzfssqo.exe nddvrsyyg.exe File opened for modification C:\Windows\SysWOW64\cehwabpuu.exe rmxkmanbn.exe File created C:\Windows\SysWOW64\kjcpmvcwa.exe rrsdyvids.exe File created C:\Windows\SysWOW64\gawepeqrg.exe vimtaewgz.exe File opened for modification C:\Windows\SysWOW64\lkqukfnun.exe zsgivftko.exe File created C:\Windows\SysWOW64\gunzfssqo.exe nddvrsyyg.exe File created C:\Windows\SysWOW64\lkqukfnun.exe zsgivftko.exe File created C:\Windows\SysWOW64\ecagynhnv.exe lkqukfnun.exe File opened for modification C:\Windows\SysWOW64\gawepeqrg.exe vimtaewgz.exe File created C:\Windows\SysWOW64\aosxrkyii.exe hwjmdcdxb.exe File created C:\Windows\SysWOW64\lgcbylatq.exe aosxrkyii.exe File created C:\Windows\SysWOW64\qpwqalowx.exe xxmnmlulp.exe File created C:\Windows\SysWOW64\rrsdyvids.exe fzisjvfsl.exe File opened for modification C:\Windows\SysWOW64\ecagynhnv.exe lkqukfnun.exe File created C:\Windows\SysWOW64\aubvboeqj.exe purjmojyc.exe File opened for modification C:\Windows\SysWOW64\nddvrsyyg.exe cltjdrwnz.exe File opened for modification C:\Windows\SysWOW64\kjcpmvcwa.exe rrsdyvids.exe File created C:\Windows\SysWOW64\vimtaewgz.exe kjcpmvcwa.exe File opened for modification C:\Windows\SysWOW64\hwjmdcdxb.exe weraobjfc.exe File created C:\Windows\SysWOW64\nddvrsyyg.exe cltjdrwnz.exe File opened for modification C:\Windows\SysWOW64\rmxkmanbn.exe gunzfssqo.exe File created C:\Windows\SysWOW64\weraobjfc.exe cehwabpuu.exe File created C:\Windows\SysWOW64\xxmnmlulp.exe lgcbylatq.exe File opened for modification C:\Windows\SysWOW64\xxmnmlulp.exe lgcbylatq.exe File opened for modification C:\Windows\SysWOW64\qpwqalowx.exe xxmnmlulp.exe File opened for modification C:\Windows\SysWOW64\cltjdrwnz.exe 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2772 1740 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 28 PID 1740 wrote to memory of 2772 1740 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 28 PID 1740 wrote to memory of 2772 1740 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 28 PID 1740 wrote to memory of 2772 1740 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 28 PID 2772 wrote to memory of 2756 2772 cltjdrwnz.exe 29 PID 2772 wrote to memory of 2756 2772 cltjdrwnz.exe 29 PID 2772 wrote to memory of 2756 2772 cltjdrwnz.exe 29 PID 2772 wrote to memory of 2756 2772 cltjdrwnz.exe 29 PID 2756 wrote to memory of 2548 2756 nddvrsyyg.exe 30 PID 2756 wrote to memory of 2548 2756 nddvrsyyg.exe 30 PID 2756 wrote to memory of 2548 2756 nddvrsyyg.exe 30 PID 2756 wrote to memory of 2548 2756 nddvrsyyg.exe 30 PID 2548 wrote to memory of 1808 2548 gunzfssqo.exe 31 PID 2548 wrote to memory of 1808 2548 gunzfssqo.exe 31 PID 2548 wrote to memory of 1808 2548 gunzfssqo.exe 31 PID 2548 wrote to memory of 1808 2548 gunzfssqo.exe 31 PID 1808 wrote to memory of 2860 1808 rmxkmanbn.exe 32 PID 1808 wrote to memory of 2860 1808 rmxkmanbn.exe 32 PID 1808 wrote to memory of 2860 1808 rmxkmanbn.exe 32 PID 1808 wrote to memory of 2860 1808 rmxkmanbn.exe 32 PID 2860 wrote to memory of 2208 2860 cehwabpuu.exe 33 PID 2860 wrote to memory of 2208 2860 cehwabpuu.exe 33 PID 2860 wrote to memory of 2208 2860 cehwabpuu.exe 33 PID 2860 wrote to memory of 2208 2860 cehwabpuu.exe 33 PID 2208 wrote to memory of 992 2208 weraobjfc.exe 34 PID 2208 wrote to memory of 992 2208 weraobjfc.exe 34 PID 2208 wrote to memory of 992 2208 weraobjfc.exe 34 PID 2208 wrote to memory of 992 2208 weraobjfc.exe 34 PID 992 wrote to memory of 2140 992 hwjmdcdxb.exe 37 PID 992 wrote to memory of 2140 992 hwjmdcdxb.exe 37 PID 992 wrote to memory of 2140 992 hwjmdcdxb.exe 37 PID 992 wrote to memory of 2140 992 hwjmdcdxb.exe 37 PID 2140 wrote to memory of 1168 2140 aosxrkyii.exe 38 PID 2140 wrote to memory of 1168 2140 aosxrkyii.exe 38 PID 2140 wrote to memory of 1168 2140 aosxrkyii.exe 38 PID 2140 wrote to memory of 1168 2140 aosxrkyii.exe 38 PID 1168 wrote to memory of 1008 1168 lgcbylatq.exe 39 PID 1168 wrote to memory of 1008 1168 lgcbylatq.exe 39 PID 1168 wrote to memory of 1008 1168 lgcbylatq.exe 39 PID 1168 wrote to memory of 1008 1168 lgcbylatq.exe 39 PID 1008 wrote to memory of 1980 1008 xxmnmlulp.exe 40 PID 1008 wrote to memory of 1980 1008 xxmnmlulp.exe 40 PID 1008 wrote to memory of 1980 1008 xxmnmlulp.exe 40 PID 1008 wrote to memory of 1980 1008 xxmnmlulp.exe 40 PID 1980 wrote to memory of 2324 1980 qpwqalowx.exe 41 PID 1980 wrote to memory of 2324 1980 qpwqalowx.exe 41 PID 1980 wrote to memory of 2324 1980 qpwqalowx.exe 41 PID 1980 wrote to memory of 2324 1980 qpwqalowx.exe 41 PID 2324 wrote to memory of 1064 2324 bpgcpurpe.exe 42 PID 2324 wrote to memory of 1064 2324 bpgcpurpe.exe 42 PID 2324 wrote to memory of 1064 2324 bpgcpurpe.exe 42 PID 2324 wrote to memory of 1064 2324 bpgcpurpe.exe 42 PID 1064 wrote to memory of 2052 1064 uhqodulzl.exe 43 PID 1064 wrote to memory of 2052 1064 uhqodulzl.exe 43 PID 1064 wrote to memory of 2052 1064 uhqodulzl.exe 43 PID 1064 wrote to memory of 2052 1064 uhqodulzl.exe 43 PID 2052 wrote to memory of 2236 2052 fzisjvfsl.exe 44 PID 2052 wrote to memory of 2236 2052 fzisjvfsl.exe 44 PID 2052 wrote to memory of 2236 2052 fzisjvfsl.exe 44 PID 2052 wrote to memory of 2236 2052 fzisjvfsl.exe 44 PID 2236 wrote to memory of 2584 2236 rrsdyvids.exe 45 PID 2236 wrote to memory of 2584 2236 rrsdyvids.exe 45 PID 2236 wrote to memory of 2584 2236 rrsdyvids.exe 45 PID 2236 wrote to memory of 2584 2236 rrsdyvids.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cltjdrwnz.exeC:\Windows\system32\cltjdrwnz.exe 564 "C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\nddvrsyyg.exeC:\Windows\system32\nddvrsyyg.exe 540 "C:\Windows\SysWOW64\cltjdrwnz.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\gunzfssqo.exeC:\Windows\system32\gunzfssqo.exe 544 "C:\Windows\SysWOW64\nddvrsyyg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rmxkmanbn.exeC:\Windows\system32\rmxkmanbn.exe 548 "C:\Windows\SysWOW64\gunzfssqo.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cehwabpuu.exeC:\Windows\system32\cehwabpuu.exe 552 "C:\Windows\SysWOW64\rmxkmanbn.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\weraobjfc.exeC:\Windows\system32\weraobjfc.exe 556 "C:\Windows\SysWOW64\cehwabpuu.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\hwjmdcdxb.exeC:\Windows\system32\hwjmdcdxb.exe 588 "C:\Windows\SysWOW64\weraobjfc.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\aosxrkyii.exeC:\Windows\system32\aosxrkyii.exe 560 "C:\Windows\SysWOW64\hwjmdcdxb.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\lgcbylatq.exeC:\Windows\system32\lgcbylatq.exe 568 "C:\Windows\SysWOW64\aosxrkyii.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\xxmnmlulp.exeC:\Windows\system32\xxmnmlulp.exe 616 "C:\Windows\SysWOW64\lgcbylatq.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\qpwqalowx.exeC:\Windows\system32\qpwqalowx.exe 580 "C:\Windows\SysWOW64\xxmnmlulp.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\bpgcpurpe.exeC:\Windows\system32\bpgcpurpe.exe 668 "C:\Windows\SysWOW64\qpwqalowx.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\uhqodulzl.exeC:\Windows\system32\uhqodulzl.exe 608 "C:\Windows\SysWOW64\bpgcpurpe.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\fzisjvfsl.exeC:\Windows\system32\fzisjvfsl.exe 664 "C:\Windows\SysWOW64\uhqodulzl.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rrsdyvids.exeC:\Windows\system32\rrsdyvids.exe 620 "C:\Windows\SysWOW64\fzisjvfsl.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\kjcpmvcwa.exeC:\Windows\system32\kjcpmvcwa.exe 632 "C:\Windows\SysWOW64\rrsdyvids.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\vimtaewgz.exeC:\Windows\system32\vimtaewgz.exe 592 "C:\Windows\SysWOW64\kjcpmvcwa.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2640 -
C:\Windows\SysWOW64\gawepeqrg.exeC:\Windows\system32\gawepeqrg.exe 636 "C:\Windows\SysWOW64\vimtaewgz.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2520 -
C:\Windows\SysWOW64\zsgivftko.exeC:\Windows\system32\zsgivftko.exe 604 "C:\Windows\SysWOW64\gawepeqrg.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\lkqukfnun.exeC:\Windows\system32\lkqukfnun.exe 600 "C:\Windows\SysWOW64\zsgivftko.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\ecagynhnv.exeC:\Windows\system32\ecagynhnv.exe 628 "C:\Windows\SysWOW64\lkqukfnun.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1456 -
C:\Windows\SysWOW64\purjmojyc.exeC:\Windows\system32\purjmojyc.exe 648 "C:\Windows\SysWOW64\ecagynhnv.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\aubvboeqj.exeC:\Windows\system32\aubvboeqj.exe 596 "C:\Windows\SysWOW64\purjmojyc.exe"24⤵
- Executes dropped EXE
PID:2480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD500272c2567df3790002d437d714e77bf
SHA11082a2414e25e8ea50ed8ce19f7458c4625629cd
SHA256d8b25dfd4162bda73227600f2027ff24561707f7d5e8698c6c871732f96e6d20
SHA51261b1d7188236942250d2089e79d8f769fc0b0497bdebb522146ec2a2c296dd2fe71fd8563c8dbee066cb562f15c961884cd23628b43cd73cef7a4dec914364c6