Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
2243161c8e6b69cd2ce69bcf2a6d46db
-
SHA1
7745b5a70ec78af25a084de90a9e220f1ebc7572
-
SHA256
b2f32f07fe8a9c10446fd0998e55b8d6c3190db87e22ae8a197ae3f69621644a
-
SHA512
f595ca5aa2460a355ed4532562baa56e6264e6821b34feb0bf3ccdb92681fde7e79582bb75203e39b45e8e7d49edf3856d550011de8ab5cd486101ca14aee71c
-
SSDEEP
24576:hQfNPPfWnzOMrZx7AbNfzc0Uks3f6g4F/GGJmR6Uay+:oNXOzOix701lU7P6fGIsQy+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2596 winservices.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinServices = "C:\\WINDOWS\\winservices.exe" winservices.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\winservices.exe 2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe File opened for modification C:\WINDOWS\winservices.exe 2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2596 2136 2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe 29 PID 2136 wrote to memory of 2596 2136 2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe 29 PID 2136 wrote to memory of 2596 2136 2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe 29 PID 2136 wrote to memory of 2596 2136 2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\WINDOWS\winservices.exe"C:\WINDOWS\winservices.exe" C:\Users\Admin\AppData\Local\Temp\2243161c8e6b69cd2ce69bcf2a6d46db_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52243161c8e6b69cd2ce69bcf2a6d46db
SHA17745b5a70ec78af25a084de90a9e220f1ebc7572
SHA256b2f32f07fe8a9c10446fd0998e55b8d6c3190db87e22ae8a197ae3f69621644a
SHA512f595ca5aa2460a355ed4532562baa56e6264e6821b34feb0bf3ccdb92681fde7e79582bb75203e39b45e8e7d49edf3856d550011de8ab5cd486101ca14aee71c