Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe
-
Size
688KB
-
MD5
28013955485b7d0b5619d67bf40c84a1
-
SHA1
24cd8c8b59b1a4a4891c3ed7945aba51857ebd12
-
SHA256
dfcea601ab96eac59a2f8c4a574b9ee394026e8436ca6fa3dde4b4b6b14342e2
-
SHA512
3e657e76a5710d91a005cde9549a6cdc39882071a88e5ad0cc2a61e40c8587e8df0a0117699b92e2306e074651e1eb9d5bd7a7e90804134d7a064a2ee5946bb5
-
SSDEEP
12288:i2Utxo37CEzLnQ9Uo5helNx/H8YrWyLB8u1q0sRt0yDQFpK3:i2UofQuoDeF/HX6r0sRt0SQFO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4272 28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.tmp -
Loads dropped DLL 1 IoCs
pid Process 4272 28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4272 4424 28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe 83 PID 4424 wrote to memory of 4272 4424 28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe 83 PID 4424 wrote to memory of 4272 4424 28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\is-NL44R.tmp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-NL44R.tmp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.tmp" /SL5="$502B6,431198,210944,C:\Users\Admin\AppData\Local\Temp\28013955485b7d0b5619d67bf40c84a1_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5792620390aae5305220283f2ce33ca68
SHA1d9fee4cb3e2fa5e7d88b45662fd58b30aa9979f0
SHA25621bc620515ebbdeb125d273c2d8db45577d05408ef624464af26afcfecfd201a
SHA512470914116f40e4f7216c840ccbc706eb7953c10e62195c9b4d15e73f422625096df6c68edb33c25e2eec3305b4a1b159054f812c4a2307aeb3e49d35ae5f575c
-
Filesize
822KB
MD546619ec3f1389e31d0465c732e4b6d30
SHA1c047898596c97ab529be6d6a9c95384caf6e108d
SHA25680681a4183ee10748ba2fa2be0a91d317d0b7f0653d6ab14e5135c181dbbf9d6
SHA512a74aee02d67e8fd30a8230fe14e58aff385564a5bb07b0c22396b2fdd7cea904275eb7b0d3e516f2dacaf3bdd7d6dc268be82f5253144dff07ae125b79ff2a1e