Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe
-
Size
232KB
-
MD5
05970baff4b605cac3ca13bb646a5ee9
-
SHA1
4856601101feac83abd1f9b2e74cc13605ba66e3
-
SHA256
89c1c950b60e0d4dedf3abc49ee112881749d188a195096a1d9798c283b3af5a
-
SHA512
e5bb9be2129ea3f8248ef23a768d2cc6c3c0f2ee93ea9f70c9034367b307ee1c9e360209183b1fbe0ce2b490ce9a09581e6a31e5aa68586a8f3e19efc4c6a4a4
-
SSDEEP
6144:QWONNb/ZAGrU4poomHg1j1VqoFh298acarOAFrExSVJBLk:Q5rtAGQbA1Jh298aqAFAxSV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3856 tasklist32.exe 1232 tasklist32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\tasklist32.exe 05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\tasklist32.exe 05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4480 05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe 3856 tasklist32.exe 1232 tasklist32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3856 4480 05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe 80 PID 4480 wrote to memory of 3856 4480 05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe 80 PID 4480 wrote to memory of 3856 4480 05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe 80 PID 3856 wrote to memory of 1232 3856 tasklist32.exe 81 PID 3856 wrote to memory of 1232 3856 tasklist32.exe 81 PID 3856 wrote to memory of 1232 3856 tasklist32.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05970baff4b605cac3ca13bb646a5ee9_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\windows\SysWOW64\tasklist32.exec:\windows\system32\tasklist32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD505970baff4b605cac3ca13bb646a5ee9
SHA14856601101feac83abd1f9b2e74cc13605ba66e3
SHA25689c1c950b60e0d4dedf3abc49ee112881749d188a195096a1d9798c283b3af5a
SHA512e5bb9be2129ea3f8248ef23a768d2cc6c3c0f2ee93ea9f70c9034367b307ee1c9e360209183b1fbe0ce2b490ce9a09581e6a31e5aa68586a8f3e19efc4c6a4a4