Analysis
-
max time kernel
143s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe
-
Size
5.2MB
-
MD5
1481afba72a9ef1316c96a5ee9353a7b
-
SHA1
cac849a430a0b1c6abcad52bb9451de784b21459
-
SHA256
451b29eb1751f21b462999f479db87f8b8561694a7727ca062b68bf2a6466a21
-
SHA512
90548d3e183ba2b65de11a4987dec7bdc91d51c3297f6ba74af58eb2398cb69f735f3e61d57084a5e17261c425fb53b6bfe30b4d6d349e294916d8b8a19f43e3
-
SSDEEP
98304:f3jb2+QanL9QOw3n2L/8Jxcqy1zJy+D3/qxFA2GC5K:f3jbZQnTGj8ov1dyGSxG2H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3744 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe -
Loads dropped DLL 3 IoCs
pid Process 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4188 set thread context of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3744 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 3744 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81 PID 4188 wrote to memory of 3744 4188 1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\1481afba72a9ef1316c96a5ee9353a7b_JaffaCakes118.exe"C:\Program Files (x86)\InCode Solutions\RemoveIT Pro v4 - SE\removeit.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5839723b1f76822461334268eaa109716
SHA1ceac28413feb55284c0654353426311a62b83bd2
SHA25683e2adde92e06b1f071ca99e2ea4886da12439bde036ecf616aa9a5849fd89e5
SHA5127123c9e5a4a9d3ab3118c88b5491907b86baf4f03a7e20bb7d88996de30cf714652f0961686bc648cb4d4e8bc1401f276805542c5947644ee93a4213951ea3c0
-
Filesize
60B
MD518b591ca8385c5c7b964f1cbb98173a3
SHA1af5dd992e5f17b4af96c8c4d9787dfba36b64feb
SHA256273bbb8a492aac786dee16402a0d9abed61cb89465b4ab6def130805e1068f22
SHA512161cb96b0ce9747b08de53e8d3459507cc75ff38eac077aafa3c1152cfaf5b0c8c17d9cd383cb0966d7d709888eebf1ccd5e4dcc23f6f3556263e87ec68d1336
-
Filesize
4KB
MD52001a57cbd2d4ab3378a199d0a4d1da1
SHA1e920bcc774e10af2a155b79ecd760c019b9cc7f9
SHA25695b2c477b7f18ceef58489cc800d409a50f2e59626fa96180a290952a61d3551
SHA512ded2ce42bf4c721caf4f9a701c8a24e8745ada1a69d822ea0cc3b462b930aee912bf245d3355782c3701bf1961bb6704733e94e603529622883356d2a4c76ac9
-
C:\Users\Admin\AppData\Local\Temp\RemoveIT Pro [7sky.AT.ua & Noby.uCoz.Ru]\SKEL\b4031fcc866fd7731f789d1b3c1e4d9420d097.SharedTA
Filesize520KB
MD5c0aaa1183de6c10443ae8f6a21a83546
SHA1b40031fcc8066fd7731f789d1b3c1e4d9420d097
SHA25668e51ef0a2ba731cca66e3248bf3238c01dc8d7b34e1da055308bde431166484
SHA5124f9be6b6d3bd706b32a7580d118d978e022dfb6cdf718d50d55eeec9874669fa40da7de4a296c612018d2848a473ac9f1a358772919639988ee1666021d9e186