Analysis
-
max time kernel
7s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
1b8a7388c57cc01a6a04f4d4b0e1831b
-
SHA1
2de1b718adae93f11c2df36abacc68a9c8c5d09f
-
SHA256
a02b015c595ee92aa45ca9e47ca14358a47d36d3ed394408c5b1690daa44aa83
-
SHA512
38184e169fd2bc2e2e4af777a7b1fbf3f6adc7d391767412f6a7f147d7423f33edc72a6e63311b8d9c9f92fb8c593c8892c20da5301345cffda30a8fd348f86f
-
SSDEEP
1536:s3iBemo5PK+dTGq5X0u8iQHp1b48weg0GwMzQrzoN7xcncFlFSmm:bsFPVr59HqTM8Fg0GkcNanc/FSmm
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1648 MsSvc32.exe 2620 MsSvc32.exe 2756 MsSvc32.exe 1880 MsSvc32.exe 2644 MsSvc32.exe 2548 MsSvc32.exe -
Loads dropped DLL 12 IoCs
pid Process 1808 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe 1808 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe 1648 MsSvc32.exe 1648 MsSvc32.exe 2620 MsSvc32.exe 2620 MsSvc32.exe 2756 MsSvc32.exe 2756 MsSvc32.exe 1880 MsSvc32.exe 1880 MsSvc32.exe 2644 MsSvc32.exe 2644 MsSvc32.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinSvc32\MsSvc32.exe 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinSvc32 MsSvc32.exe File created C:\Windows\SysWOW64\WinSvc32\MsSvc32.exe MsSvc32.exe File created C:\Windows\SysWOW64\WinSvc32\MsSvc32.exe MsSvc32.exe File created C:\Windows\SysWOW64\WinSvc32\MsSvc32.exe MsSvc32.exe File opened for modification C:\Windows\SysWOW64\WinSvc32 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe File created C:\Windows\SysWOW64\WinSvc32\MsSvc32.exe 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinSvc32 MsSvc32.exe File opened for modification C:\Windows\SysWOW64\WinSvc32 MsSvc32.exe File opened for modification C:\Windows\SysWOW64\WinSvc32 MsSvc32.exe File created C:\Windows\SysWOW64\WinSvc32\MsSvc32.exe MsSvc32.exe File opened for modification C:\Windows\SysWOW64\WinSvc32 MsSvc32.exe File created C:\Windows\SysWOW64\WinSvc32\MsSvc32.exe MsSvc32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1808 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe 1648 MsSvc32.exe 2620 MsSvc32.exe 2756 MsSvc32.exe 1880 MsSvc32.exe 2644 MsSvc32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1648 1808 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe 28 PID 1808 wrote to memory of 1648 1808 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe 28 PID 1808 wrote to memory of 1648 1808 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe 28 PID 1808 wrote to memory of 1648 1808 1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe 28 PID 1648 wrote to memory of 2620 1648 MsSvc32.exe 29 PID 1648 wrote to memory of 2620 1648 MsSvc32.exe 29 PID 1648 wrote to memory of 2620 1648 MsSvc32.exe 29 PID 1648 wrote to memory of 2620 1648 MsSvc32.exe 29 PID 2620 wrote to memory of 2756 2620 MsSvc32.exe 30 PID 2620 wrote to memory of 2756 2620 MsSvc32.exe 30 PID 2620 wrote to memory of 2756 2620 MsSvc32.exe 30 PID 2620 wrote to memory of 2756 2620 MsSvc32.exe 30 PID 2756 wrote to memory of 1880 2756 MsSvc32.exe 31 PID 2756 wrote to memory of 1880 2756 MsSvc32.exe 31 PID 2756 wrote to memory of 1880 2756 MsSvc32.exe 31 PID 2756 wrote to memory of 1880 2756 MsSvc32.exe 31 PID 1880 wrote to memory of 2644 1880 MsSvc32.exe 32 PID 1880 wrote to memory of 2644 1880 MsSvc32.exe 32 PID 1880 wrote to memory of 2644 1880 MsSvc32.exe 32 PID 1880 wrote to memory of 2644 1880 MsSvc32.exe 32 PID 2644 wrote to memory of 2548 2644 MsSvc32.exe 33 PID 2644 wrote to memory of 2548 2644 MsSvc32.exe 33 PID 2644 wrote to memory of 2548 2644 MsSvc32.exe 33 PID 2644 wrote to memory of 2548 2644 MsSvc32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b8a7388c57cc01a6a04f4d4b0e1831b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe7⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe8⤵PID:1864
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe9⤵PID:736
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe10⤵PID:812
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe11⤵PID:2868
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe12⤵PID:2724
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe13⤵PID:384
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe14⤵PID:1220
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe15⤵PID:2860
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe16⤵PID:1980
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe17⤵PID:2084
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe18⤵PID:2204
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe19⤵PID:2964
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe20⤵PID:3052
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe21⤵PID:2016
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe22⤵PID:824
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe23⤵PID:1332
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe24⤵PID:2180
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe25⤵PID:888
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe26⤵PID:1256
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe27⤵PID:2840
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe28⤵PID:2720
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe29⤵PID:1596
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe30⤵PID:1112
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe31⤵PID:2348
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe32⤵PID:2680
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe33⤵PID:2616
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe34⤵PID:2932
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe35⤵PID:1572
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe36⤵PID:2612
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe37⤵PID:2496
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe38⤵PID:1216
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe39⤵PID:1492
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe40⤵PID:1428
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe41⤵PID:2848
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe42⤵PID:812
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe43⤵PID:2872
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe44⤵PID:2856
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe45⤵PID:592
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe46⤵PID:2392
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe47⤵PID:2792
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe48⤵PID:1740
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe49⤵PID:2712
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe50⤵PID:1736
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe51⤵PID:2028
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe52⤵PID:2204
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe53⤵PID:2964
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe54⤵PID:2076
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe55⤵PID:292
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe56⤵PID:340
-
C:\Windows\SysWOW64\WinSvc32\MsSvc32.exeC:\Windows\system32\WinSvc32\MsSvc32.exe57⤵PID:1984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD51b8a7388c57cc01a6a04f4d4b0e1831b
SHA12de1b718adae93f11c2df36abacc68a9c8c5d09f
SHA256a02b015c595ee92aa45ca9e47ca14358a47d36d3ed394408c5b1690daa44aa83
SHA51238184e169fd2bc2e2e4af777a7b1fbf3f6adc7d391767412f6a7f147d7423f33edc72a6e63311b8d9c9f92fb8c593c8892c20da5301345cffda30a8fd348f86f