Analysis
-
max time kernel
93s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 01:23
Behavioral task
behavioral1
Sample
2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe
-
Size
27KB
-
MD5
2a7d2befb03145a9837f4827d05db1ed
-
SHA1
d4464ec3c4057c737310ca7f2b2a089102d231e4
-
SHA256
5223364bcd9f0400157bfc50971245d1aeff93f6e83680918544e6a74b060cef
-
SHA512
198475c4a2c060165c3b37237ffa126e97f0bc06c3886492bd4e431b929799957d84c4ef33f8fa1146a7b316d67f034cb3486ff01b8e465b32017ca6f30db99b
-
SSDEEP
768:edi0A1Gy05vCPVSrTRuVheaA8S0Uux/N86UUs:epAED5E4TRu/ef8S6x/7U
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3896-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3896-4-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\gpfmqq.bat 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\mvzrnduba.bat 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2488 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3896 wrote to memory of 888 3896 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe 85 PID 3896 wrote to memory of 888 3896 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe 85 PID 3896 wrote to memory of 888 3896 2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe 85 PID 888 wrote to memory of 2488 888 cmd.exe 87 PID 888 wrote to memory of 2488 888 cmd.exe 87 PID 888 wrote to memory of 2488 888 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a7d2befb03145a9837f4827d05db1ed_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\mvzrnduba.bat2⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- Runs ping.exe
PID:2488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131B
MD5d06c3ed72beff5649223c882c7b9b341
SHA1d8fa562b34bdd5516a0f2cbd061eab1ea0a9252f
SHA25694896f8206c83d76727dba50402f8246b3db9214d7db1ecf7843f0c63d65befb
SHA51268fe35bb772e3165ad608d89d79c48073d87942d3b93c293561da31b41b93cd4e0decbac72f67401a448203d122228c6eea77ec4c14a8c09eb963b01da243c5a
-
Filesize
100B
MD526e6ad4bac8f8b5b0453f9b59c04c532
SHA1535c1031003df650c26d16e3489d36d2349c2a7c
SHA256d68c133ea8a0aaec0e221abef7a3956cf37369eb8a369ba73e0696ef68da3fec
SHA5123669a2fff7a30e1f386f7939407895c1da78c3351d423df657837ce1e7239cf728066441dae0061286f9c2c6447557abeebece40394d382c13799938a7610135