Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
1775c26866b07e9267d43451d128625a_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1775c26866b07e9267d43451d128625a_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1775c26866b07e9267d43451d128625a_JaffaCakes118.exe
-
Size
267KB
-
MD5
1775c26866b07e9267d43451d128625a
-
SHA1
a8fe68622942af5cc9cc57a86b4eb5ba8d8f4581
-
SHA256
cfd5ddc4779f434e59069948a6ce2a2b8fd820f012738cbfb510a1eeecf07ca9
-
SHA512
9d2630ac35d26540983c876bb2191456796f33cc1bd4b42077ff5bfdda41a572be597e875fe814d08644b171ee4cb2c7195536b99c633d265aa0038de198c2fe
-
SSDEEP
6144:+3GEeC/U62M3znCmy0tjbNf7/ePV88igE5skr0o:QG3762SC07/eGRgA
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3208 bpudmlzp.exe 4992 uijrwubrkous.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell Profile Solutions Window = "C:\\Users\\Admin\\Local Settings\\Application Data\\bncirtjcblsvofh\\bpudmlzp.exe" 1775c26866b07e9267d43451d128625a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 4992 uijrwubrkous.exe 4992 uijrwubrkous.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe 3208 bpudmlzp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 620 wrote to memory of 3208 620 1775c26866b07e9267d43451d128625a_JaffaCakes118.exe 93 PID 620 wrote to memory of 3208 620 1775c26866b07e9267d43451d128625a_JaffaCakes118.exe 93 PID 620 wrote to memory of 3208 620 1775c26866b07e9267d43451d128625a_JaffaCakes118.exe 93 PID 3208 wrote to memory of 4992 3208 bpudmlzp.exe 94 PID 3208 wrote to memory of 4992 3208 bpudmlzp.exe 94 PID 3208 wrote to memory of 4992 3208 bpudmlzp.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1775c26866b07e9267d43451d128625a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1775c26866b07e9267d43451d128625a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\Local Settings\Application Data\bncirtjcblsvofh\bpudmlzp.exe"C:\Users\Admin\Local Settings\Application Data\bncirtjcblsvofh\bpudmlzp.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\Local Settings\Application Data\bncirtjcblsvofh\uijrwubrkous.exeWATCHDOGPROC "C:\Users\Admin\Local Settings\Application Data\bncirtjcblsvofh\bpudmlzp.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4084,i,10925946972013221578,8820669985803190952,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:81⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD51775c26866b07e9267d43451d128625a
SHA1a8fe68622942af5cc9cc57a86b4eb5ba8d8f4581
SHA256cfd5ddc4779f434e59069948a6ce2a2b8fd820f012738cbfb510a1eeecf07ca9
SHA5129d2630ac35d26540983c876bb2191456796f33cc1bd4b42077ff5bfdda41a572be597e875fe814d08644b171ee4cb2c7195536b99c633d265aa0038de198c2fe