Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 01:59
Behavioral task
behavioral1
Sample
2440921d6d97837e32085d92db769167_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2440921d6d97837e32085d92db769167_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2440921d6d97837e32085d92db769167_JaffaCakes118.exe
-
Size
23KB
-
MD5
2440921d6d97837e32085d92db769167
-
SHA1
ea835f34cebc49676b6223dfd4812e5b7bbf7655
-
SHA256
d4277bd7bc4654d4c0b7ca5c74894e1ba75cc7612ac1129d0441132ce6ace8e0
-
SHA512
aba091b2cdc4cacfa7eeeee712ac510a97e5ed1ec61e53c6b9a17883864ceedcff29e783e7052a50c916867d5b72f8bd59db4c25c89973eb6f3a2c254819ae88
-
SSDEEP
384:/T4d8WgztszLLHOwZrxNNHXqbvlsrtJ1wg+s5/x56A+AsjpItnaNJawcudoD7UJ1:kdCztszLioJXglshF75/x56QWnbcuyDw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe 2992 rundll32.exe -
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2180-19-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system.ini 2440921d6d97837e32085d92db769167_JaffaCakes118.exe File created C:\Windows\SysWOW64\New.dll 2440921d6d97837e32085d92db769167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\New.dll 2440921d6d97837e32085d92db769167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1003.dll 2440921d6d97837e32085d92db769167_JaffaCakes118.exe File created C:\Windows\SysWOW64\1003.dll 2440921d6d97837e32085d92db769167_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WindowsXpDat.dll 2440921d6d97837e32085d92db769167_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsXpDat.dll 2440921d6d97837e32085d92db769167_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2656 2180 2440921d6d97837e32085d92db769167_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2656 2180 2440921d6d97837e32085d92db769167_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2656 2180 2440921d6d97837e32085d92db769167_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2656 2180 2440921d6d97837e32085d92db769167_JaffaCakes118.exe 29 PID 2656 wrote to memory of 2992 2656 cmd.exe 31 PID 2656 wrote to memory of 2992 2656 cmd.exe 31 PID 2656 wrote to memory of 2992 2656 cmd.exe 31 PID 2656 wrote to memory of 2992 2656 cmd.exe 31 PID 2656 wrote to memory of 2992 2656 cmd.exe 31 PID 2656 wrote to memory of 2992 2656 cmd.exe 31 PID 2656 wrote to memory of 2992 2656 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2440921d6d97837e32085d92db769167_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2440921d6d97837e32085d92db769167_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\n04d.dll,DeleteSelf C:\Users\Admin\AppData\Local\Temp\2440921d6d97837e32085d92db769167_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\n04d.dll,DeleteSelf C:\Users\Admin\AppData\Local\Temp\2440921d6d97837e32085d92db769167_JaffaCakes118.exe3⤵
- Deletes itself
- Loads dropped DLL
PID:2992
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5e6c8801074e1110976061c9306cd8ba8
SHA1927443a0400f42a7e708726e43acde676f254250
SHA256e1c0bb46cd92f904d8fe07f8f4b12782783cab5af0f2b52d76660d3607d1d3a3
SHA5124c10d713118280c1ed3ef88c9f74e59ff9ed50ce870b8a29d44c324d6c8efc365d74b2d70b1faac107e34f46d226c5bd4c3e3c251e6d77ba88b92570886f11e9