Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 01:54
Behavioral task
behavioral1
Sample
0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe
-
Size
94KB
-
MD5
0be9fb6523ec8989708bfef16fe72d4f
-
SHA1
b7f2c00b85ca72bea25ed500d8075e6636a1efd4
-
SHA256
9e5bfd73bf0846cfa34f3bdd7c08f890bf9a93d41d489cbe7032e84edb13104f
-
SHA512
39ded0a2be4a3387c57915251edfcc75dd67ad53bf8012fe4df0caa098d11cb2a709fffd6e9761eb776c3f7b46cbd8a10ce9ea3af2946f1f15c6df628220f287
-
SSDEEP
1536:Tr1L7E7JAhnMLA3ZmBcUSDbGtTMYo23WnaA4aY3RzWpfrutKju7nSsOonlaIzgUY:n17E9Ahnp3ZmSG2aA4RBzWpfruKGSKny
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2360-0-0x0000000001390000-0x00000000013BC000-memory.dmp upx behavioral1/memory/2360-1-0x0000000001390000-0x00000000013BC000-memory.dmp upx -
Enumerates connected drives 3 TTPs 5 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe File opened (read-only) \??\K: 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe File opened (read-only) \??\N: 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe File opened (read-only) \??\Z: 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe File opened (read-only) \??\G: 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1992 2360 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1992 2360 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe 28 PID 2360 wrote to memory of 1992 2360 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe 28 PID 2360 wrote to memory of 1992 2360 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe 28 PID 2360 wrote to memory of 1992 2360 0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0be9fb6523ec8989708bfef16fe72d4f_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 2882⤵
- Program crash
PID:1992
-