Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 00:52
Behavioral task
behavioral1
Sample
24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe
-
Size
14KB
-
MD5
24147881c3d393d0a8c7c8c62668e88c
-
SHA1
bc724981cab03f87518b566afb786a596361f276
-
SHA256
d72155b95d4a53a3399044273b68ac273b708ab360b8bbeb2a44a9bcc6a3bd05
-
SHA512
9ab5c435f275b1ae2f6fcc6d68ab8eefe1f8cb0456c75a05f9d30b1a2a81f1fd20e92fb7ea5c97f883961ed41d6781f5ae45a29a4575760f5dd301c50eadc021
-
SSDEEP
384:UcQIjE5EpcvLfhc5waHf3zNZGtIUE7q1mozuOsf3:UsrpcDiqavR0Cq1ZVsP
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 1596 micsusk.exe -
resource yara_rule behavioral2/memory/1568-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0007000000023414-4.dat upx behavioral2/memory/1568-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/1596-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\micsus.dll 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe File created C:\Windows\SysWOW64\micsusk.exe 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\micsusk.exe 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1596 1568 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe 81 PID 1568 wrote to memory of 1596 1568 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe 81 PID 1568 wrote to memory of 1596 1568 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe 81 PID 1568 wrote to memory of 4556 1568 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe 90 PID 1568 wrote to memory of 4556 1568 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe 90 PID 1568 wrote to memory of 4556 1568 24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\micsusk.exeC:\Windows\system32\micsusk.exe ˜‰2⤵
- Executes dropped EXE
PID:1596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\24147881c3d393d0a8c7c8c62668e88c_JaffaCakes118.exe.bat2⤵PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD54fcee714cfa768e2ceb56b446e066597
SHA1b862fdc19a7ae2609a6472eecf8d5d4978b5d679
SHA256d2d5cd817a4ea2df68b9852c717f2c79abc8d1b8e8af1d4845f4f4393b89389d
SHA51222b28e1f28e6bf4f2dad04ee5d4a5c3fdb026ed6351bbdbe36e883329b9b3f5d3e2e189ea6063cf98d3730378e46eef3f251335096847e21183f751807749150
-
Filesize
14KB
MD524147881c3d393d0a8c7c8c62668e88c
SHA1bc724981cab03f87518b566afb786a596361f276
SHA256d72155b95d4a53a3399044273b68ac273b708ab360b8bbeb2a44a9bcc6a3bd05
SHA5129ab5c435f275b1ae2f6fcc6d68ab8eefe1f8cb0456c75a05f9d30b1a2a81f1fd20e92fb7ea5c97f883961ed41d6781f5ae45a29a4575760f5dd301c50eadc021