Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe
-
Size
68KB
-
MD5
000eb495f39d8cdae4b8b2de869d14fe
-
SHA1
03b50cd21bf8712b5854afd915308786794e46ad
-
SHA256
def0fabc71f047d834e179ae6db5aa142e0de2c2ee427f33f3107c1e68915623
-
SHA512
4be3d20d838f4c85299feeeb8762c7f3274d03bfec5309b2b8bf8fa92cef8f1573708ffd940395aef959103d72f1aee00b9fb621074bae571fe9df312f7daefe
-
SSDEEP
1536:r1BvK2hM46fGBCzSfNNI6yx8Hoh3eypmrYbwWoR:r1BvK7pmCzSlNILr7mrlR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2712 BCSSync.exe 2644 BCSSync.exe -
Loads dropped DLL 3 IoCs
pid Process 3040 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 3040 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 2712 BCSSync.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2424 set thread context of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2712 set thread context of 2644 2712 BCSSync.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 2424 wrote to memory of 3040 2424 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 28 PID 3040 wrote to memory of 2712 3040 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2712 3040 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2712 3040 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 29 PID 3040 wrote to memory of 2712 3040 000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe 29 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2712 wrote to memory of 2644 2712 BCSSync.exe 30 PID 2644 wrote to memory of 2516 2644 BCSSync.exe 31 PID 2644 wrote to memory of 2516 2644 BCSSync.exe 31 PID 2644 wrote to memory of 2516 2644 BCSSync.exe 31 PID 2644 wrote to memory of 2516 2644 BCSSync.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\000eb495f39d8cdae4b8b2de869d14fe_JaffaCakes118.exe5⤵PID:2516
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD571ad76bf6e4ed5a1259bb10833d71d6f
SHA182f3d692dac94e4542b691b0c120a75baaaba284
SHA2562ab6790da5dc8a7c6436f5050c37f369df14632884d1cf7189ffb33b939efef4
SHA5121b7e9a77925fc95c3acb0342e56dcd8855d0fd7cf8fc6f8a146cc705cf98e8fcd9dd60e03ca90778d71efdc6f228be79d212fb4071061d3a0b9fc28140a99584