Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe
-
Size
212KB
-
MD5
1805062a1bba92b7fbe19a44e297bea7
-
SHA1
b1111d3981c039d45dea41c0979a19f3b879dd74
-
SHA256
cdbeb583678fc2d0e4c50c475cf36911af1c8ddddb8124aa5242d49908a399e2
-
SHA512
e90db0972d2f68aa153c0477dfc4434e6b6392af300ebb0f9639041b5d0298bf130496a4de4ee1f1697f52b37b18b76fc82f5ac2e7bb99749735c95ddd2b6367
-
SSDEEP
3072:jx6UW6tpmJTHwJEdKSu0AtHd+3OSny3bTsU+hA7ox6IPHeqo3Sc//////Q3pdD:jxDaH2wKMAJdKPnyCom6UNc//////cv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2428 huansuanqi.exe -
Loads dropped DLL 38 IoCs
pid Process 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2428 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 82 PID 1788 wrote to memory of 2428 1788 1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1805062a1bba92b7fbe19a44e297bea7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\huansuanqi.exeC:\Users\Admin\AppData\Local\Temp\huansuanqi.exe2⤵
- Executes dropped EXE
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5837007c55d9c9e1529c8a6a5b899926a
SHA14f6c9a9a725be613894a49e4a84d4e3d9e5b1916
SHA256c846feb655b8024a8c10661c3ebad4133fda0c0f0a88ddeff806c13e9b59dd9b
SHA512ec7d0c098c45ffa28bb53bd05736a3bc1e310bf0263bd0e06810469f3a7b9e5e8b9a9b1bba3e5846eb7b9badc5a93cd44226fa837144abc137b59952ffb6d82c
-
Filesize
10KB
MD5810f3a0aefe36a9f63e29e604bea91a9
SHA12559d3d4adf51f8ecbe2d07e669e344eb7d0bd80
SHA256f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779
SHA512836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb
-
Filesize
20KB
MD550fdadda3e993688401f6f1108fabdb4
SHA104a9ae55d0fb726be49809582cea41d75bf22a9a
SHA2566d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6
SHA512e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8