Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe
-
Size
594KB
-
MD5
0f5cc78690326a8625edaec5bab83990
-
SHA1
0f9af8e6bbe2788143a8e6f8eecab5e0815ebfb5
-
SHA256
051c6e5e58b4eb47ca05c7f1d79dcb966a8e662de146d5ad39ba72dca7ab3de4
-
SHA512
21998a82110bca21f6938599150be131c97426eecfc0a39ade69115710556ebc21a2916d51287b5546afe8dba3c92e9333998abf701a4d29b352614d46a010bd
-
SSDEEP
12288:h3tDRxd4SeLP2e5PeDF8HhwvYsF3Z4mxxwqJ0MvIHvTBOG:h9VB85PcCKQmXwNMCNOG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3088 system32.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\system32.exe 0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe File opened for modification C:\Windows\system32.exe 0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe File created C:\Windows\Delete.bat 0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3088 system32.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2316 2760 0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe 83 PID 2760 wrote to memory of 2316 2760 0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe 83 PID 2760 wrote to memory of 2316 2760 0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe 83 PID 3088 wrote to memory of 1324 3088 system32.exe 82 PID 3088 wrote to memory of 1324 3088 system32.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0f5cc78690326a8625edaec5bab83990_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:2316
-
-
C:\Windows\system32.exeC:\Windows\system32.exe1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1324
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5a441fb056609cd6b3d8c33f50b6a4b66
SHA19d81d371fa0ea3c81496efe3682e3c36f43ab679
SHA2568e50596e6de878adbd5578f197bd47435a3bc12c56222f2ec19f6dc3606970e7
SHA5126c4622b2ac35cd48eb0b13db401caad8716a5de9599209a04d9c9e1c1c3109d883697640c783100c6887b65f16860eedfdc5d7625d9b3320c10c255c50a26865
-
Filesize
594KB
MD50f5cc78690326a8625edaec5bab83990
SHA10f9af8e6bbe2788143a8e6f8eecab5e0815ebfb5
SHA256051c6e5e58b4eb47ca05c7f1d79dcb966a8e662de146d5ad39ba72dca7ab3de4
SHA51221998a82110bca21f6938599150be131c97426eecfc0a39ade69115710556ebc21a2916d51287b5546afe8dba3c92e9333998abf701a4d29b352614d46a010bd