Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe
-
Size
651KB
-
MD5
06254051a87de6f56d56e540c317cb8d
-
SHA1
175de6a4f210e192974866501de60098cd06e9cf
-
SHA256
021f93eedff25b238cfaf1a46d0c14c4c3f1a6a900e496607e60427bce0a564e
-
SHA512
8b6e7b014865ad0947524bdcde209e400a254bb7f9dda8577edf6832bcc140a56cc45a692b4cdcd0621b30b8ac5087472df504139e8858a8ce4a77577e558309
-
SSDEEP
12288:0D2FLluEmXVIeM1Tr+od+KF3Z4mxx20MHoTAFbcPK:0DPEQaF15+KQmX2K/P
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3424 guocyok88.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\guocyok88.exe 06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe File opened for modification C:\Windows\guocyok88.exe 06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe File created C:\Windows\Delete.BAT 06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 1404 2508 WerFault.exe 82 4784 3424 WerFault.exe 92 1360 3424 WerFault.exe 92 432 2508 WerFault.exe 82 3388 3424 WerFault.exe 92 3800 3424 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2508 wrote to memory of 4408 2508 06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe 96 PID 2508 wrote to memory of 4408 2508 06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe 96 PID 2508 wrote to memory of 4408 2508 06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe 96 PID 3424 wrote to memory of 5104 3424 guocyok88.exe 103 PID 3424 wrote to memory of 5104 3424 guocyok88.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06254051a87de6f56d56e540c317cb8d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 5162⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.BAT2⤵PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 1362⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2508 -ip 25081⤵PID:1012
-
C:\Windows\guocyok88.exeC:\Windows\guocyok88.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 5282⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 6362⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 6562⤵
- Program crash
PID:3388
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 6762⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3424 -ip 34241⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3424 -ip 34241⤵PID:1308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2508 -ip 25081⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3424 -ip 34241⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3424 -ip 34241⤵PID:4368
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD551613b9b6b45bd7aa11258c939a0b4a3
SHA172e4a37cb2e293f7851fb0cae2686c971cd80d07
SHA256bd86fb80beb259103272a2374ec6b67dcb18fc279b67768d254712174304a6dd
SHA5127f43fc456df1946bdfa286d89725fbb68920f7539aaeafd8cf4ec8df00e695c1ac32a8bd7093d8be49031facb0788a562a11a267a376877d5402f763dd5cfd3d
-
Filesize
651KB
MD506254051a87de6f56d56e540c317cb8d
SHA1175de6a4f210e192974866501de60098cd06e9cf
SHA256021f93eedff25b238cfaf1a46d0c14c4c3f1a6a900e496607e60427bce0a564e
SHA5128b6e7b014865ad0947524bdcde209e400a254bb7f9dda8577edf6832bcc140a56cc45a692b4cdcd0621b30b8ac5087472df504139e8858a8ce4a77577e558309