Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 01:23
Behavioral task
behavioral1
Sample
2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
-
Size
27KB
-
MD5
2a7d2befb03145a9837f4827d05db1ed
-
SHA1
d4464ec3c4057c737310ca7f2b2a089102d231e4
-
SHA256
5223364bcd9f0400157bfc50971245d1aeff93f6e83680918544e6a74b060cef
-
SHA512
198475c4a2c060165c3b37237ffa126e97f0bc06c3886492bd4e431b929799957d84c4ef33f8fa1146a7b316d67f034cb3486ff01b8e465b32017ca6f30db99b
-
SSDEEP
768:edi0A1Gy05vCPVSrTRuVheaA8S0Uux/N86UUs:epAED5E4TRu/ef8S6x/7U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
resource yara_rule behavioral1/memory/2280-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2280-9-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\beufdl.bat 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\gmonufswr.bat 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2892 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2908 2280 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2908 2280 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2908 2280 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe 32 PID 2280 wrote to memory of 2908 2280 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe 32 PID 2908 wrote to memory of 2892 2908 cmd.exe 34 PID 2908 wrote to memory of 2892 2908 cmd.exe 34 PID 2908 wrote to memory of 2892 2908 cmd.exe 34 PID 2908 wrote to memory of 2892 2908 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\gmonufswr.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- Runs ping.exe
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131B
MD5d06c3ed72beff5649223c882c7b9b341
SHA1d8fa562b34bdd5516a0f2cbd061eab1ea0a9252f
SHA25694896f8206c83d76727dba50402f8246b3db9214d7db1ecf7843f0c63d65befb
SHA51268fe35bb772e3165ad608d89d79c48073d87942d3b93c293561da31b41b93cd4e0decbac72f67401a448203d122228c6eea77ec4c14a8c09eb963b01da243c5a
-
Filesize
100B
MD5b88a83b9a6e23b0c69720dba9eb367db
SHA1393cb1e55d16563facb5e11da7c773681ef882bf
SHA256391b2b47fbe9cb5d2a5f352735f9743732de9778a593f0a73eff7dd4969bd567
SHA512c4a4b9dfed28b5fadc4666f31285260663f5d05114f9d8d4005a67b78ca532d8a25be1863667a1a7da70de599d46aad02c454f5238007645b0c0630dcd79bebf