Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe
-
Size
13KB
-
MD5
2e1b93a37c12954e94efc04f70f2b55c
-
SHA1
999b6ca9e71d6a58dc2337e5fea1a6880193a2e1
-
SHA256
49627275dfe654ebd48e38811449889a1607ef9a39b3ec058e91ce1d870eb38f
-
SHA512
f4a53c29334f7c764d0089c49702b73eba8ef1d71ac9c1add3a7e7054e7280e3ada6e09fbc47054d286a00ca0501f1be809bb95a95be53f22b969447f963a44b
-
SSDEEP
384:jxNR77zN0w638TNFTBs16QCzOcg9FgXiou:jxN17zn66W2zONFgXiou
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2828 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1968 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 29 PID 2548 wrote to memory of 1968 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 29 PID 2548 wrote to memory of 1968 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 29 PID 2548 wrote to memory of 1968 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2828 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2828 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2828 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2828 2548 2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e1b93a37c12954e94efc04f70f2b55c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat""2⤵PID:1968
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "2⤵
- Deletes itself
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351B
MD536d5421223f9d2698ba32da321f0fc39
SHA128327a6cba0deab084b98fc25a1826b5605c08bb
SHA25662acb90ec182c1215ea1589cb7cd55084310032310889a8f9a507e3c31eff540
SHA512c2b8e7abedd7a2b2a55807a391b8213314a6000f23cb927fc591f71f778f118da18d6982e5e24ba5b4c0f226a496a8e96bc26d59923ba1d6083db8f1ed4f0eea
-
Filesize
146B
MD533d6fe24ac083f17ca58115f296938da
SHA12bd97e42dc149b29ba6543f31f49712e9bedbdc8
SHA2569661e460396f6eb9232a2395e96b29615ce73b4da265b93fe0aa54d5d572eb4e
SHA512b68a87b2a70d4b3995c2012cff4b6bad779a900dd19828dcbbb50fe6bd26c9547b4d9b4b51a9a94b18c55913c0c4256a4b6261bd709934d24f557df1a48583fb