Analysis
-
max time kernel
149s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
00272c2567df3790002d437d714e77bf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00272c2567df3790002d437d714e77bf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
00272c2567df3790002d437d714e77bf_JaffaCakes118.exe
-
Size
400KB
-
MD5
00272c2567df3790002d437d714e77bf
-
SHA1
1082a2414e25e8ea50ed8ce19f7458c4625629cd
-
SHA256
d8b25dfd4162bda73227600f2027ff24561707f7d5e8698c6c871732f96e6d20
-
SHA512
61b1d7188236942250d2089e79d8f769fc0b0497bdebb522146ec2a2c296dd2fe71fd8563c8dbee066cb562f15c961884cd23628b43cd73cef7a4dec914364c6
-
SSDEEP
6144:y2V/1S85Q1WWRyohxw2anHQYk005S6uYXv42uWNJp9MdYQCcNYDnyWIQe61DE+v:51S8+QFoXQHTk0gSengPNYDnX3Dv
Malware Config
Signatures
-
Executes dropped EXE 24 IoCs
pid Process 2676 lxcvaiswj.exe 3176 jibjjscpl.exe 1964 layjgkvxu.exe 2540 idpwpuoip.exe 1460 cdmenmgry.exe 2892 iglsvwrkb.exe 912 cgislojsc.exe 2284 hjzfuzcdf.exe 1072 bjwfsqulg.exe 3132 zmvtabfei.exe 2028 berbysfmr.exe 4584 ypiohdqxu.exe 5088 bhfoxvjgv.exe 1216 ysecfntzy.exe 3612 slbkdxuhz.exe 4808 ynsplpfsc.exe 440 sopxbzxal.exe 4908 pqolsrqto.exe 4420 rrllibicp.exe 2664 ptcyqutnr.exe 4736 ruzgodlvs.exe 3576 owylxweov.exe 1732 ipvungxwe.exe 920 ozmhdyhhh.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\slbkdxuhz.exe ysecfntzy.exe File created C:\Windows\SysWOW64\ynsplpfsc.exe slbkdxuhz.exe File created C:\Windows\SysWOW64\ozmhdyhhh.exe ipvungxwe.exe File created C:\Windows\SysWOW64\iglsvwrkb.exe cdmenmgry.exe File created C:\Windows\SysWOW64\zmvtabfei.exe bjwfsqulg.exe File opened for modification C:\Windows\SysWOW64\berbysfmr.exe zmvtabfei.exe File opened for modification C:\Windows\SysWOW64\ysecfntzy.exe bhfoxvjgv.exe File created C:\Windows\SysWOW64\berbysfmr.exe zmvtabfei.exe File opened for modification C:\Windows\SysWOW64\owylxweov.exe ruzgodlvs.exe File created C:\Windows\SysWOW64\layjgkvxu.exe jibjjscpl.exe File created C:\Windows\SysWOW64\cdmenmgry.exe idpwpuoip.exe File opened for modification C:\Windows\SysWOW64\cdmenmgry.exe idpwpuoip.exe File created C:\Windows\SysWOW64\bjwfsqulg.exe hjzfuzcdf.exe File opened for modification C:\Windows\SysWOW64\ynsplpfsc.exe slbkdxuhz.exe File opened for modification C:\Windows\SysWOW64\pqolsrqto.exe sopxbzxal.exe File created C:\Windows\SysWOW64\ptcyqutnr.exe rrllibicp.exe File created C:\Windows\SysWOW64\ruzgodlvs.exe ptcyqutnr.exe File created C:\Windows\SysWOW64\lxcvaiswj.exe 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jibjjscpl.exe lxcvaiswj.exe File opened for modification C:\Windows\SysWOW64\idpwpuoip.exe layjgkvxu.exe File opened for modification C:\Windows\SysWOW64\iglsvwrkb.exe cdmenmgry.exe File opened for modification C:\Windows\SysWOW64\ruzgodlvs.exe ptcyqutnr.exe File created C:\Windows\SysWOW64\ipvungxwe.exe owylxweov.exe File opened for modification C:\Windows\SysWOW64\rrllibicp.exe pqolsrqto.exe File opened for modification C:\Windows\SysWOW64\layjgkvxu.exe jibjjscpl.exe File opened for modification C:\Windows\SysWOW64\zmvtabfei.exe bjwfsqulg.exe File created C:\Windows\SysWOW64\slbkdxuhz.exe ysecfntzy.exe File created C:\Windows\SysWOW64\sopxbzxal.exe ynsplpfsc.exe File opened for modification C:\Windows\SysWOW64\lxcvaiswj.exe 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe File created C:\Windows\SysWOW64\cgislojsc.exe iglsvwrkb.exe File created C:\Windows\SysWOW64\pqolsrqto.exe sopxbzxal.exe File opened for modification C:\Windows\SysWOW64\ptcyqutnr.exe rrllibicp.exe File opened for modification C:\Windows\SysWOW64\hjzfuzcdf.exe cgislojsc.exe File opened for modification C:\Windows\SysWOW64\ypiohdqxu.exe berbysfmr.exe File opened for modification C:\Windows\SysWOW64\ozmhdyhhh.exe ipvungxwe.exe File created C:\Windows\SysWOW64\idpwpuoip.exe layjgkvxu.exe File created C:\Windows\SysWOW64\rrllibicp.exe pqolsrqto.exe File created C:\Windows\SysWOW64\owylxweov.exe ruzgodlvs.exe File created C:\Windows\SysWOW64\ypiohdqxu.exe berbysfmr.exe File created C:\Windows\SysWOW64\bhfoxvjgv.exe ypiohdqxu.exe File opened for modification C:\Windows\SysWOW64\bhfoxvjgv.exe ypiohdqxu.exe File created C:\Windows\SysWOW64\ysecfntzy.exe bhfoxvjgv.exe File created C:\Windows\SysWOW64\jibjjscpl.exe lxcvaiswj.exe File opened for modification C:\Windows\SysWOW64\cgislojsc.exe iglsvwrkb.exe File created C:\Windows\SysWOW64\hjzfuzcdf.exe cgislojsc.exe File opened for modification C:\Windows\SysWOW64\bjwfsqulg.exe hjzfuzcdf.exe File opened for modification C:\Windows\SysWOW64\sopxbzxal.exe ynsplpfsc.exe File opened for modification C:\Windows\SysWOW64\ipvungxwe.exe owylxweov.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2676 4616 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 86 PID 4616 wrote to memory of 2676 4616 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 86 PID 4616 wrote to memory of 2676 4616 00272c2567df3790002d437d714e77bf_JaffaCakes118.exe 86 PID 2676 wrote to memory of 3176 2676 lxcvaiswj.exe 87 PID 2676 wrote to memory of 3176 2676 lxcvaiswj.exe 87 PID 2676 wrote to memory of 3176 2676 lxcvaiswj.exe 87 PID 3176 wrote to memory of 1964 3176 jibjjscpl.exe 88 PID 3176 wrote to memory of 1964 3176 jibjjscpl.exe 88 PID 3176 wrote to memory of 1964 3176 jibjjscpl.exe 88 PID 1964 wrote to memory of 2540 1964 layjgkvxu.exe 89 PID 1964 wrote to memory of 2540 1964 layjgkvxu.exe 89 PID 1964 wrote to memory of 2540 1964 layjgkvxu.exe 89 PID 2540 wrote to memory of 1460 2540 idpwpuoip.exe 92 PID 2540 wrote to memory of 1460 2540 idpwpuoip.exe 92 PID 2540 wrote to memory of 1460 2540 idpwpuoip.exe 92 PID 1460 wrote to memory of 2892 1460 cdmenmgry.exe 93 PID 1460 wrote to memory of 2892 1460 cdmenmgry.exe 93 PID 1460 wrote to memory of 2892 1460 cdmenmgry.exe 93 PID 2892 wrote to memory of 912 2892 iglsvwrkb.exe 94 PID 2892 wrote to memory of 912 2892 iglsvwrkb.exe 94 PID 2892 wrote to memory of 912 2892 iglsvwrkb.exe 94 PID 912 wrote to memory of 2284 912 cgislojsc.exe 99 PID 912 wrote to memory of 2284 912 cgislojsc.exe 99 PID 912 wrote to memory of 2284 912 cgislojsc.exe 99 PID 2284 wrote to memory of 1072 2284 hjzfuzcdf.exe 101 PID 2284 wrote to memory of 1072 2284 hjzfuzcdf.exe 101 PID 2284 wrote to memory of 1072 2284 hjzfuzcdf.exe 101 PID 1072 wrote to memory of 3132 1072 bjwfsqulg.exe 102 PID 1072 wrote to memory of 3132 1072 bjwfsqulg.exe 102 PID 1072 wrote to memory of 3132 1072 bjwfsqulg.exe 102 PID 3132 wrote to memory of 2028 3132 zmvtabfei.exe 103 PID 3132 wrote to memory of 2028 3132 zmvtabfei.exe 103 PID 3132 wrote to memory of 2028 3132 zmvtabfei.exe 103 PID 2028 wrote to memory of 4584 2028 berbysfmr.exe 104 PID 2028 wrote to memory of 4584 2028 berbysfmr.exe 104 PID 2028 wrote to memory of 4584 2028 berbysfmr.exe 104 PID 4584 wrote to memory of 5088 4584 ypiohdqxu.exe 105 PID 4584 wrote to memory of 5088 4584 ypiohdqxu.exe 105 PID 4584 wrote to memory of 5088 4584 ypiohdqxu.exe 105 PID 5088 wrote to memory of 1216 5088 bhfoxvjgv.exe 106 PID 5088 wrote to memory of 1216 5088 bhfoxvjgv.exe 106 PID 5088 wrote to memory of 1216 5088 bhfoxvjgv.exe 106 PID 1216 wrote to memory of 3612 1216 ysecfntzy.exe 107 PID 1216 wrote to memory of 3612 1216 ysecfntzy.exe 107 PID 1216 wrote to memory of 3612 1216 ysecfntzy.exe 107 PID 3612 wrote to memory of 4808 3612 slbkdxuhz.exe 108 PID 3612 wrote to memory of 4808 3612 slbkdxuhz.exe 108 PID 3612 wrote to memory of 4808 3612 slbkdxuhz.exe 108 PID 4808 wrote to memory of 440 4808 ynsplpfsc.exe 109 PID 4808 wrote to memory of 440 4808 ynsplpfsc.exe 109 PID 4808 wrote to memory of 440 4808 ynsplpfsc.exe 109 PID 440 wrote to memory of 4908 440 sopxbzxal.exe 110 PID 440 wrote to memory of 4908 440 sopxbzxal.exe 110 PID 440 wrote to memory of 4908 440 sopxbzxal.exe 110 PID 4908 wrote to memory of 4420 4908 pqolsrqto.exe 111 PID 4908 wrote to memory of 4420 4908 pqolsrqto.exe 111 PID 4908 wrote to memory of 4420 4908 pqolsrqto.exe 111 PID 4420 wrote to memory of 2664 4420 rrllibicp.exe 112 PID 4420 wrote to memory of 2664 4420 rrllibicp.exe 112 PID 4420 wrote to memory of 2664 4420 rrllibicp.exe 112 PID 2664 wrote to memory of 4736 2664 ptcyqutnr.exe 113 PID 2664 wrote to memory of 4736 2664 ptcyqutnr.exe 113 PID 2664 wrote to memory of 4736 2664 ptcyqutnr.exe 113 PID 4736 wrote to memory of 3576 4736 ruzgodlvs.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\lxcvaiswj.exeC:\Windows\system32\lxcvaiswj.exe 1340 "C:\Users\Admin\AppData\Local\Temp\00272c2567df3790002d437d714e77bf_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\jibjjscpl.exeC:\Windows\system32\jibjjscpl.exe 1248 "C:\Windows\SysWOW64\lxcvaiswj.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\layjgkvxu.exeC:\Windows\system32\layjgkvxu.exe 1352 "C:\Windows\SysWOW64\jibjjscpl.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\idpwpuoip.exeC:\Windows\system32\idpwpuoip.exe 1232 "C:\Windows\SysWOW64\layjgkvxu.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cdmenmgry.exeC:\Windows\system32\cdmenmgry.exe 1264 "C:\Windows\SysWOW64\idpwpuoip.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\iglsvwrkb.exeC:\Windows\system32\iglsvwrkb.exe 1376 "C:\Windows\SysWOW64\cdmenmgry.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cgislojsc.exeC:\Windows\system32\cgislojsc.exe 1384 "C:\Windows\SysWOW64\iglsvwrkb.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\hjzfuzcdf.exeC:\Windows\system32\hjzfuzcdf.exe 1396 "C:\Windows\SysWOW64\cgislojsc.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\bjwfsqulg.exeC:\Windows\system32\bjwfsqulg.exe 1256 "C:\Windows\SysWOW64\hjzfuzcdf.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\zmvtabfei.exeC:\Windows\system32\zmvtabfei.exe 1280 "C:\Windows\SysWOW64\bjwfsqulg.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\berbysfmr.exeC:\Windows\system32\berbysfmr.exe 1392 "C:\Windows\SysWOW64\zmvtabfei.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\ypiohdqxu.exeC:\Windows\system32\ypiohdqxu.exe 1432 "C:\Windows\SysWOW64\berbysfmr.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\bhfoxvjgv.exeC:\Windows\system32\bhfoxvjgv.exe 1300 "C:\Windows\SysWOW64\ypiohdqxu.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\ysecfntzy.exeC:\Windows\system32\ysecfntzy.exe 1312 "C:\Windows\SysWOW64\bhfoxvjgv.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\slbkdxuhz.exeC:\Windows\system32\slbkdxuhz.exe 1284 "C:\Windows\SysWOW64\ysecfntzy.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\ynsplpfsc.exeC:\Windows\system32\ynsplpfsc.exe 1292 "C:\Windows\SysWOW64\slbkdxuhz.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\sopxbzxal.exeC:\Windows\system32\sopxbzxal.exe 1448 "C:\Windows\SysWOW64\ynsplpfsc.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\pqolsrqto.exeC:\Windows\system32\pqolsrqto.exe 1452 "C:\Windows\SysWOW64\sopxbzxal.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rrllibicp.exeC:\Windows\system32\rrllibicp.exe 1316 "C:\Windows\SysWOW64\pqolsrqto.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\ptcyqutnr.exeC:\Windows\system32\ptcyqutnr.exe 1356 "C:\Windows\SysWOW64\rrllibicp.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\ruzgodlvs.exeC:\Windows\system32\ruzgodlvs.exe 1500 "C:\Windows\SysWOW64\ptcyqutnr.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\owylxweov.exeC:\Windows\system32\owylxweov.exe 1496 "C:\Windows\SysWOW64\ruzgodlvs.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3576 -
C:\Windows\SysWOW64\ipvungxwe.exeC:\Windows\system32\ipvungxwe.exe 1344 "C:\Windows\SysWOW64\owylxweov.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\ozmhdyhhh.exeC:\Windows\system32\ozmhdyhhh.exe 1528 "C:\Windows\SysWOW64\ipvungxwe.exe"25⤵
- Executes dropped EXE
PID:920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD500272c2567df3790002d437d714e77bf
SHA11082a2414e25e8ea50ed8ce19f7458c4625629cd
SHA256d8b25dfd4162bda73227600f2027ff24561707f7d5e8698c6c871732f96e6d20
SHA51261b1d7188236942250d2089e79d8f769fc0b0497bdebb522146ec2a2c296dd2fe71fd8563c8dbee066cb562f15c961884cd23628b43cd73cef7a4dec914364c6