Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 03:39
Static task
static1
Behavioral task
behavioral1
Sample
2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe
-
Size
345KB
-
MD5
2adae0a577c85a86623f3ba7b64f1df9
-
SHA1
5ab2dea0ca031f0ebaa070c6fbffb55497fea435
-
SHA256
cab13cec2abc8419bdf918c14f483f23b51b95bdc39185436318b5b4959b9ba6
-
SHA512
c1fce8b8881b467e48adce90548be937272d3e8e7f42bbe16ed15a33adfe7865fde33cf6fcd0c132fd7ac580c57bd18042657d5274863849d66a110d8df09fbb
-
SSDEEP
6144:DD1TsCHwtdOt+VaI7ztYx1/YnZCSc72aqGLPrRySHh/h11xX+neM6cb:DR4CQtot+VNZYxxyHcKfGLPr8SHh/lxG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1860 llfsvicsl.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\llfsvicsl.exe llfsvicsl.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 868 2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe 868 2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe 868 2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe 868 2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe 868 2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe 868 2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe 1860 llfsvicsl.exe 1860 llfsvicsl.exe 1860 llfsvicsl.exe 1860 llfsvicsl.exe 1860 llfsvicsl.exe 1860 llfsvicsl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2adae0a577c85a86623f3ba7b64f1df9_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
C:\Windows\SysWOW64\llfsvicsl.exeC:\Windows\SysWOW64\llfsvicsl.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1860
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD52adae0a577c85a86623f3ba7b64f1df9
SHA15ab2dea0ca031f0ebaa070c6fbffb55497fea435
SHA256cab13cec2abc8419bdf918c14f483f23b51b95bdc39185436318b5b4959b9ba6
SHA512c1fce8b8881b467e48adce90548be937272d3e8e7f42bbe16ed15a33adfe7865fde33cf6fcd0c132fd7ac580c57bd18042657d5274863849d66a110d8df09fbb