Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe
-
Size
15KB
-
MD5
2964a4c1279a6b3c42e66b8c3557f41e
-
SHA1
0a717f23dd9422db39e9d6a85e0a7561291277b5
-
SHA256
8094cdc4f5c8ed280a27077dc12ec10cc006adfdfc7345601e6eab26e82b450b
-
SHA512
850ed98af3ac9b43b3afdc4f344f239b59d883690b4f66f3d3789b8150bc8a9bc10b5e88b2fa78b8db978cc26d1b84790675973269558309d06edc6ec19c5525
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMxnOik:hDXWipuE+K3/SSHgxmHROik
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2068 DEMFC88.exe 2820 DEM5235.exe 2472 DEMA766.exe 2364 DEMFD33.exe 1624 DEM5255.exe 2148 DEMA7A5.exe -
Loads dropped DLL 6 IoCs
pid Process 2864 2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe 2068 DEMFC88.exe 2820 DEM5235.exe 2472 DEMA766.exe 2364 DEMFD33.exe 1624 DEM5255.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2068 2864 2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe 31 PID 2864 wrote to memory of 2068 2864 2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe 31 PID 2864 wrote to memory of 2068 2864 2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe 31 PID 2864 wrote to memory of 2068 2864 2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2820 2068 DEMFC88.exe 33 PID 2068 wrote to memory of 2820 2068 DEMFC88.exe 33 PID 2068 wrote to memory of 2820 2068 DEMFC88.exe 33 PID 2068 wrote to memory of 2820 2068 DEMFC88.exe 33 PID 2820 wrote to memory of 2472 2820 DEM5235.exe 35 PID 2820 wrote to memory of 2472 2820 DEM5235.exe 35 PID 2820 wrote to memory of 2472 2820 DEM5235.exe 35 PID 2820 wrote to memory of 2472 2820 DEM5235.exe 35 PID 2472 wrote to memory of 2364 2472 DEMA766.exe 37 PID 2472 wrote to memory of 2364 2472 DEMA766.exe 37 PID 2472 wrote to memory of 2364 2472 DEMA766.exe 37 PID 2472 wrote to memory of 2364 2472 DEMA766.exe 37 PID 2364 wrote to memory of 1624 2364 DEMFD33.exe 39 PID 2364 wrote to memory of 1624 2364 DEMFD33.exe 39 PID 2364 wrote to memory of 1624 2364 DEMFD33.exe 39 PID 2364 wrote to memory of 1624 2364 DEMFD33.exe 39 PID 1624 wrote to memory of 2148 1624 DEM5255.exe 41 PID 1624 wrote to memory of 2148 1624 DEM5255.exe 41 PID 1624 wrote to memory of 2148 1624 DEM5255.exe 41 PID 1624 wrote to memory of 2148 1624 DEM5255.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2964a4c1279a6b3c42e66b8c3557f41e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\DEMFC88.exe"C:\Users\Admin\AppData\Local\Temp\DEMFC88.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\DEM5235.exe"C:\Users\Admin\AppData\Local\Temp\DEM5235.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\DEMA766.exe"C:\Users\Admin\AppData\Local\Temp\DEMA766.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\DEMFD33.exe"C:\Users\Admin\AppData\Local\Temp\DEMFD33.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\DEM5255.exe"C:\Users\Admin\AppData\Local\Temp\DEM5255.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\DEMA7A5.exe"C:\Users\Admin\AppData\Local\Temp\DEMA7A5.exe"7⤵
- Executes dropped EXE
PID:2148
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51be9c0022c579a195de21224ef850c49
SHA194538f918682b3e3e480623742001f24e0491921
SHA256cdcbdce25c02a1b2c65a63b81fb95059c2cfce37ebcd1ad4a66b8e4061eaa6d5
SHA512567f2fa2564a394542b2aa23671969a66ce060b60f8ff5e7a137212460ba5889c3034edd3850752524874bb5c866f734aae125d1cd37991b515b9781a6fb0537
-
Filesize
15KB
MD518c7e79b2551d0ba66d3b19270c058d7
SHA1f2afe8eca28353d71178844e91522cd35361149d
SHA25689e326558ffeee9d66540f5f44fcccd170ffcfcc096f4ff90cde8a21118d1725
SHA51204e5569875d173b4092af33c23db84513f4170197a06e80e525ae85b1f461a42e5266aa902cae6c269d78a1b11e028a6edc7bf8320daf34c8ca7e3e72406db24
-
Filesize
15KB
MD5e8a5858de91154fa2dc0a9583c7a0dcd
SHA10925cfc5676cc80b58fe80d9e07691d0648f7a8d
SHA256b5966d45c5c661ddbdca4582864fec98aa8685828eb782b6e52a6c60959619e3
SHA5120653a42a1a5726f279487cb402c796cf589a92297f6b3226938cb1059bff92d9f7ab209e03854127d862711e9afc2436b60ecd32afb2feeb8b68ac3cd4a82946
-
Filesize
15KB
MD5356190df91aaa2f1b42fd1b66afda489
SHA1318ccdf1fee30dd5da9daba40291c5b3cad48c20
SHA256f3907850d9e177fda7e779ed3ab7170211bf375a8255e21dfe48b01d582e97ce
SHA51283f417153a9660fca7ffe3c6a5f8ab35b9507cbafe35c2d9a210d423af922b728c171f47f739fec2742f03000680b6859c316121061b9ded74d178c585591879
-
Filesize
15KB
MD5128fa080339cb30b260aa01f368091a7
SHA11a9800fb6bf6e6b07ae1e6706afca272bd70f2ed
SHA256300e47e2d375f456f233178ff012793cf91763672c56b09ca2210037720065e3
SHA5126252b621e95bb0ba727cf4e309da244b5b2d21d5544561c0ab2dc57d1128c9b650c1a14041cd650820df0dd0416d4c4e0f5dc96bcc1ae35989b36875aebf2c06
-
Filesize
15KB
MD52dba33737824a3eaf99f109c628b2eaf
SHA1c2d9e345e7ba0f3ff0fede477ba28fced8be5fb8
SHA256e82aff34513c6aea143dd055072f2066e98168bdff3e946bc655b0c4fafe3cf5
SHA5126a0f4b0329e41781df9df9691c5f64e0619ba5385ede1ed237820852dddedaa2751ff189fd6944048cce4203bb3b1c3b23aba4d4b04ae846075e997dca6ba925