Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 05:03
Behavioral task
behavioral1
Sample
18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe
-
Size
10KB
-
MD5
18dfd74e6c9654a81c3696fc6560a48d
-
SHA1
4c95fe3474091c3a4d922d46a9cd660a70a8cc93
-
SHA256
570143ac72441e79ad044425cfca48159cac808db621378341cf4026813618a4
-
SHA512
36573fe09fe9808e9a0c2cc9ecbc334ebf701efce6e5c42396a087046fcc1b65bcd99fba6460500be23ff3b7b738ba32e62735b7353436649a2c60f31f7d3875
-
SSDEEP
192:MgzxM9W2r3Fbu3AGBMWW9K+xpGGy/n6kDUtzHcBg:dz61bu3BMWW9K+hkiIg
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 1316 rmchampk.exe -
resource yara_rule behavioral2/memory/2300-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x00070000000233d2-4.dat upx behavioral2/memory/2300-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1316-7-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rmchamp.dll 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe File created C:\Windows\SysWOW64\rmchampk.exe 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rmchampk.exe 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1316 2300 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe 81 PID 2300 wrote to memory of 1316 2300 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe 81 PID 2300 wrote to memory of 1316 2300 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe 81 PID 2300 wrote to memory of 2536 2300 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe 90 PID 2300 wrote to memory of 2536 2300 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe 90 PID 2300 wrote to memory of 2536 2300 18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rmchampk.exeC:\Windows\system32\rmchampk.exe ˜‰2⤵
- Executes dropped EXE
PID:1316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\18dfd74e6c9654a81c3696fc6560a48d_JaffaCakes118.exe.bat2⤵PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5d4dad6588913a447f9c0ef24f2f843ca
SHA1ee32f1bef94cc62617933dc05ab1493929be09c6
SHA256cd9e00422b8d511214b89b4c463884ecb5b6297c2ce8ec8bb40ea4d6e8f02a5a
SHA51287458112e2708abafa616434483a3f125253fc1ec2441fffc19975018275db2de625251c35975bfe8ceaa23ae9c7c1acb63e7a76eb8edec328e6a1b374df3c93
-
Filesize
10KB
MD518dfd74e6c9654a81c3696fc6560a48d
SHA14c95fe3474091c3a4d922d46a9cd660a70a8cc93
SHA256570143ac72441e79ad044425cfca48159cac808db621378341cf4026813618a4
SHA51236573fe09fe9808e9a0c2cc9ecbc334ebf701efce6e5c42396a087046fcc1b65bcd99fba6460500be23ff3b7b738ba32e62735b7353436649a2c60f31f7d3875