Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe
-
Size
114KB
-
MD5
2261c8f923d69a4eb2f7833fe1df729b
-
SHA1
782251ea06b08559e5e5d10d1a128dbd57508cf5
-
SHA256
7ba3dc6cd87fab43a650dc23044a5af2461c73298b3f795e2f988ffef24554d9
-
SHA512
d6f44c9a9f23d86fd187cbe2fe9e6a080f0398cd48270c4a80660b2247ac62a5c324b9f7a7312bed722179d0a1fe30ed9baedefb842e09c382f95e6c8b765d0e
-
SSDEEP
1536:LqhW3ElJgD13lnWN4lJ/itAwQEYtXrfU1e5lJmc9xOLNF8aFkZht9+oVtIU:Lq5JQ1Vnd/itRQEAbOv0OLQPGoV1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1748 896.exe 2676 896.exe -
Loads dropped DLL 3 IoCs
pid Process 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 1748 896.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1808 set thread context of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1748 set thread context of 2676 1748 896.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 896.exe 2676 896.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2664 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1748 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 28 PID 1808 wrote to memory of 1748 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 28 PID 1808 wrote to memory of 1748 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 28 PID 1808 wrote to memory of 1748 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2664 1808 2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe 29 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 1748 wrote to memory of 2676 1748 896.exe 30 PID 2676 wrote to memory of 1240 2676 896.exe 21 PID 2676 wrote to memory of 1240 2676 896.exe 21 PID 2676 wrote to memory of 1240 2676 896.exe 21 PID 2676 wrote to memory of 1240 2676 896.exe 21 PID 2676 wrote to memory of 1240 2676 896.exe 21 PID 2676 wrote to memory of 1240 2676 896.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\896.exe"C:\Users\Admin\AppData\Local\Temp\896.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\896.exe"C:\Users\Admin\AppData\Local\Temp\896.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2261c8f923d69a4eb2f7833fe1df729b_JaffaCakes118.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5ad72d69815d6bd48aae32d89df71d652
SHA1871f6d2c207336f4b8684e80c08337c466f7ce97
SHA256a735ee0fc2d5cfc224a8cefc7afa50994d065b7cda934f156b192e1ae935fd41
SHA5125257d8d2559f2bcb171a30c8048aa3c8a9e76fb84a86ed767c4bd0c36ac362f67a8b4a473c6796bab5cde92065f87f5aab3bcd98c1118015496df40e27878cce